Search for persons
X
?
Proceedings of the Third international conference on Engineering secure software and systems ,
3
Efficient symbolic execution for analysing cryptographic pr..:
, In:
?
Lecture Notes in Computer Science; Engineering Secure Software and Systems ,
4
Efficient Symbolic Execution for Analysing Cryptographic Pr..:
, In:
?
Proceedings of the 15th ACM conference on Computer and communications security ,
5
Cryptographically verified implementations for TLS:
, In:
?