IC

Results: 14218



#Item
31

PDF Document

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2016-03-03 03:04:53
32Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage Chetan Bansal1 , Karthikeyan Bhargavan2, Antoine Delignat-Lavaud2 , and Sergio Maffeis3, 1

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2013-01-25 08:24:32
33On Abstra
t Interpretation of Mobile Ambients  Fran
es
a Levi DISI, University of Genova, Italy Sergio Maeis Department of Computing, Imperial College, UK levifrandisi.unige.it

On Abstra t Interpretation of Mobile Ambients  Fran es a Levi DISI, University of Genova, Italy Sergio Ma eis Department of Computing, Imperial College, UK levifrandisi.unige.it

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
34NSADAbstract Domains for Type Juggling Vincenzo Arceri1 Department of Computer Science, University of Verona, Italy

NSADAbstract Domains for Type Juggling Vincenzo Arceri1 Department of Computer Science, University of Verona, Italy

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2017-07-06 06:07:28
35Code-Carrying Authorization Sergio Maffeis2,3 , Mart´ın Abadi1,2 , C´edric Fournet1 , and Andrew D. Gordon1 1 2

Code-Carrying Authorization Sergio Maffeis2,3 , Mart´ın Abadi1,2 , C´edric Fournet1 , and Andrew D. Gordon1 1 2

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2009-08-14 07:09:04
36............................................................... .............................................................. ............................................................... .............................

............................................................... .............................................................. ............................................................... .............................

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-03-09 06:39:52
37Hiding in the Crowd: an Analysis of the E�ectiveness of Browser Fingerprinting at Large Scale Alejandro Gómez-Boix Univ Rennes, Inria, CNRS, IRISA Rennes, France

Hiding in the Crowd: an Analysis of the E�ectiveness of Browser Fingerprinting at Large Scale Alejandro Gómez-Boix Univ Rennes, Inria, CNRS, IRISA Rennes, France

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2018-03-06 09:06:09
    38An executable formal semantics of PHP Daniele Filaretti and Sergio Maffeis Department of Computing, Imperial College London {d.filaretti11,sergio.maffeis}@imperial.ac.uk  tifact

    An executable formal semantics of PHP Daniele Filaretti and Sergio Maffeis Department of Computing, Imperial College London {d.filaretti11,sergio.maffeis}@imperial.ac.uk tifact

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2014-05-13 05:07:09
    39EVOLUTION OF EXPLOIT KITS Exploring Past Trends and Current Improvements Joseph C. Chen

    EVOLUTION OF EXPLOIT KITS Exploring Past Trends and Current Improvements Joseph C. Chen

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2016-01-29 03:59:56
    40A Trusted Mechanised JavaScript Specification Martin Bodin Arthur Charguéraud  Daniele Filaretti

    A Trusted Mechanised JavaScript Specification Martin Bodin Arthur Charguéraud Daniele Filaretti

    Add to Reading List

    Source URL: www.doc.ic.ac.uk

    Language: English - Date: 2013-11-19 11:15:29