Filter your results
- 5
- 5
- 5
- 4
- 1
- 2
- 1
- 2
- 1
- 1
- 2
- 5
- 1
- 2
- 2
- 5
- 1
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Can We Support Applications' Evolution in Multi-Application Smart Cards by Security-by-Contract?4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.221-228, ⟨10.1007/978-3-642-12368-9_16⟩
Conference papers
hal-01059143v1
|
||
|
Implementing the WebSocket Protocol Based on Formal Modelling and Automated Code Generation4th International Conference on Distributed Applications and Interoperable Systems (DAIS), Jun 2014, Berlin, Germany. pp.104-118, ⟨10.1007/978-3-662-43352-2_9⟩
Conference papers
hal-01287735v1
|
||
|
The Stochastic Quality Calculus16th International Conference on Coordination Models and Languages (COORDINATION), Jun 2014, Berlin, Germany. pp.179-193, ⟨10.1007/978-3-662-43376-8_12⟩
Conference papers
hal-01290076v1
|
||
|
Denial-of-Service Security Attack in the Continuous-Time World34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.149-165, ⟨10.1007/978-3-662-43613-4_10⟩
Conference papers
hal-01398014v1
|
||
|
Uniform Protection for Multi-exposed Targets34th Formal Techniques for Networked and Distributed Systems (FORTE), Jun 2014, Berlin, Germany. pp.182-198, ⟨10.1007/978-3-662-43613-4_12⟩
Conference papers
hal-01398016v1
|