![]() ![]()
Barbara Kordy, Sjouke Mauw, Sasa Radomirovic, and Patrick Schweitzer. SECURITY OBSCURITY SERIESOn tables of random numbers (Reprinted from "Sankhya: The Indian Journal of Statistics", Series A, Vol. Rogers, editors, Cambridge Summer School in Mathematical Logic, volume 337 of Lecture Notes in Mathematics, pages 95-112. SECURITY OBSCURITY CODEInternational Obfuscated C Code Contest. SECURITY OBSCURITY FULLOn full abstraction for PCF: I, II, and III. Games with incomplete information played by 'bayesian' players, I-III. ![]() On the relationship between hierarchy and type morphisms. w2.eff.org/IP/Video/DVDCCA_case/#bunner-press. Press releases and court documents on DVD CCA v Bunner Case. Pitfalls in the use of imperfect information. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2003. Abstract State Machines: A Method for High-Level System Design and Analysis. SECURITY OBSCURITY SOFTWAREAbstract Software Specifications, volume 86 of Lecture Notes in Computer Science. Winning Ways for your Mathematical Plays, volume 1-2.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |