- 博客(0)
- 资源 (14)
- 收藏
- 关注
A paper about program analysis
Program analysis.
Program analysis.
Program analysis.
Program analysis.
Program analysis.
To help share, there will be reurned bonus.
2011-05-02
Algorithms-seriese
Algorithm and Complexity.
Perhapse an average-refered one, with its styles.
Algorithm and Complexity.
Algorithm and Complexity.
Algorithm and Complexity.
Algorithm and Complexity.
Algorithm and Complexity.
Algorithm and Complexity.
2011-05-02
TCG software stack
TCG software stack;
TCG software stack;
TCG software stack;
TCG software stack;
TCG software stack.
An important part for which much analysis work might be planned to do.
2010-10-14
Principles of model checking
model checking; had better buy one.
formal methods for mission-critical software development.
formal methods for mission-critical software development.
formal methods for mission-critical software development.
2010-10-14
July-Vista-Integrity-Techniques
The vista trustworthy wares and related techniques.
The vista trustworthy wares and related techniques.
The vista trustworthy wares and related techniques.
2010-10-14
Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2
resource meterial able to be acquired freely.
Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2
Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2
2010-10-14
PRISM: Enabling Personal Verification of Code Integrity, untampered execution, and Trusted I/O on legacy systems
PRISM: Enabling Personal Verification of Code Integrity, untampered execution, and Trusted I/O on legacy systems.
One in the seriese of work by Mark Ryan on trusted computing.
2010-10-14
Formal verification or certification related
Symbolic bisimulation of the applied pi-calculus; formal methodes for mobile systems communiciation.
Symbolic bisimulation of the applied pi-calculus; formal methodes for mobile systems communiciation.
Symbolic bisimulation of the applied pi-calculus; formal methodes for mobile systems communiciation.
2010-10-14
trust integrity measurement and reporting for virtualized platforms
trust integrity measurement and reporting
trust integrity measurement and reporting
trust integrity measurement and reporting
2010-09-30
offline dictionary attack on TCG TPM weak authorization data, and solution
maybe a good portal to research on tcp tpm.
a point in line with a researcher in hp labs.
2010-09-30
papers about formal verification
toward the verification of persive systems.
you can find this paper is on a project supervisized by professor Mark Ryan atl.
It is on the issue of verification of protocols.
2010-09-30
dos71scd.zip
dos71scd.zip
dos71scd.zip
dos71scd.zip
dos71scd.zip
dos71scd.zip
dos71scd.zip
dos71scd.zip
2010-08-25
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人