GForge

Results: 481



#Item
41J Comput Virol Hack Tech:211–217 DOIs11416CORRESPONDENCE  Statically detecting use after free on binary code

J Comput Virol Hack Tech:211–217 DOIs11416CORRESPONDENCE Statically detecting use after free on binary code

Add to Reading List

Source URL: binsec.gforge.inria.fr

Language: English - Date: 2017-11-15 05:31:12
    42The StarPU Runtime System Part. 1 – Introducing StarPU ST RM  Static Optimizations – Runtime Methods

    The StarPU Runtime System Part. 1 – Introducing StarPU ST RM Static Optimizations – Runtime Methods

    Add to Reading List

    Source URL: starpu.gforge.inria.fr

    Language: English - Date: 2017-04-19 03:54:18
      43TLS 1.3  ProVerif CryptoVerif

      TLS 1.3 ProVerif CryptoVerif

      Add to Reading List

      Source URL: prosecco.gforge.inria.fr

      Language: English - Date: 2017-06-19 16:31:28
        44Modelling Cubical Type Theory in Agda

        Modelling Cubical Type Theory in Agda

        Add to Reading List

        Source URL: hott-uf.gforge.inria.fr

        Language: English - Date: 2016-06-30 09:21:07
          45CryptoVerif  TLS 1.3 Mechanized Computational Proof of the TLS 1.3 Standard Candidate

          CryptoVerif TLS 1.3 Mechanized Computational Proof of the TLS 1.3 Standard Candidate

          Add to Reading List

          Source URL: prosecco.gforge.inria.fr

          Language: English - Date: 2017-04-29 12:45:36
            46Homotopy Type Theory in Lean Floris van Doorn Department of Philosophy Carnegie Mellon University http://leanprover.github.io

            Homotopy Type Theory in Lean Floris van Doorn Department of Philosophy Carnegie Mellon University http://leanprover.github.io

            Add to Reading List

            Source URL: hott-uf.gforge.inria.fr

            Language: English - Date: 2016-06-29 06:24:43
              47Introduction  Using CryptoVerif Proof technique

              Introduction Using CryptoVerif Proof technique

              Add to Reading List

              Source URL: prosecco.gforge.inria.fr

              Language: English - Date: 2012-10-01 07:25:52
                48From Computationally-Proved Protocol Specifications to Implementations and Application to SSH∗ David Cad´e and Bruno Blanchet INRIA Paris-Rocquencourt, Paris, France {david.cade,bruno.blanchet}@inria.fr Abstract

                From Computationally-Proved Protocol Specifications to Implementations and Application to SSH∗ David Cad´e and Bruno Blanchet INRIA Paris-Rocquencourt, Paris, France {david.cade,bruno.blanchet}@inria.fr Abstract

                Add to Reading List

                Source URL: prosecco.gforge.inria.fr

                Language: English - Date: 2013-03-21 05:47:13
                  49Protocoles cryptographiques:  Attaques – Vérification

                  Protocoles cryptographiques: Attaques – Vérification

                  Add to Reading List

                  Source URL: prosecco.gforge.inria.fr

                  Language: French - Date: 2014-06-13 08:04:03
                    50What is secure compilation? Security goals and attacker models Cătălin Hrițcu Inria Paris  1

                    What is secure compilation? Security goals and attacker models Cătălin Hrițcu Inria Paris 1

                    Add to Reading List

                    Source URL: prosecco.gforge.inria.fr

                    Language: English - Date: 2018-05-14 13:24:16