|
61 |
Automatic verification of behavior preservation at the transformation level for relational model transformation Dyck, Johannes. - Potsdam : Universität Potsdam, 2017
|
|
|
62 |
Designing digital services with cryptographic guarantees for data security and privacy Ziegeldorf, Jan Henrik. - Aachen : Universitätsbibliothek der RWTH Aachen, 2017
|
|
|
63 |
Detection and Exploitation of Information Flow Leaks Do, Quoc Huy. - Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017
|
|
|
64 |
Diagnosing Software Configuration Errors via Static Analysis Dong, Zhen. - Heidelberg : Universitätsbibliothek Heidelberg, 2017
|
|
|
65 |
Enhancing Security in Managing Personal Data by Web Systems Wild, Stefan. - Chemnitz : Universitätsverlag Chemnitz, 2017
|
|
|
66 |
Faster Oblivious Transfer Extension and Its Impact on Secure Computation Zohner, Michael. - Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017
|
|
|
67 |
Fault-Tolerant Spatio-Temporal Compression Scheme for Wireless Sensor Networks Ali, Azad. - Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017
|
|
|
68 |
Identification of Software Features in Issue Tracking System Data Merten, Thorsten. - Heidelberg : Universitätsbibliothek Heidelberg, 2017
|
|
|
69 |
Improving hosted continuous integration services Weyand, Christopher. - Potsdam : Universität Potsdam, 2017
|
|
|
70 |
Improving Mobile-Malware Investigations with Static and Dynamic Code Analysis Techniques Rasthofer, Siegfried. - Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2017
|
|