|
511 |
Bringing zero-knowledge proofs of knowledge to practice Krenn, Stephan. - Berlin : Logos, 2012
|
|
|
512 |
Broadening the scope of security usability from the individual to the organizational Bartsch, Steffen, 2012
|
|
|
513 |
BubbleStorm Leng, Christof, 2012
|
|
|
514 |
Classification of metamorphic malware using value set analysis Leder, Felix. - Waabs : GCA-Verl., 2012, Als Ms. gedr.
|
|
|
515 |
Clustering-based support for software architecture restructuring Streekmann, Niels. - Wiesbaden : Vieweg & Teubner, 2012, 1st ed.
|
|
|
516 |
Coalgebras and the axioms of iteration Milius, Stefan, 2012
|
|
|
517 |
Composite modeling based on distributed graph transformation and the eclipse modeling framework Jurack, Stefan, 2012
|
|
|
518 |
Consistent key-based routing in decentralized and reconfigurable data services Högqvist, Mikael, 2012
|
|
|
519 |
Consistent Software Cities Steinbrückner, Frank, 2012
|
|
|
520 |
Constraint driven schema merging Li, Xiang, 2012
|
|