TU Darmstadt / ULB / TUbiblio

Using Control-Flow Techniques in a Security Context - A Survey on Common Prototypes and their Common Weakness

Seeger, Mark (2011):
Using Control-Flow Techniques in a Security Context - A Survey on Common Prototypes and their Common Weakness.
In: International Conference on Network Computing and Information Security (NCIS 2011), [Conference or Workshop Item]

Item Type: Conference or Workshop Item
Erschienen: 2011
Creators: Seeger, Mark
Title: Using Control-Flow Techniques in a Security Context - A Survey on Common Prototypes and their Common Weakness
Language: German
Title of Book: International Conference on Network Computing and Information Security (NCIS 2011)
Uncontrolled Keywords: Secure Services
Divisions: LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
LOEWE > LOEWE-Zentren
LOEWE
Date Deposited: 30 Dec 2016 20:23
Identification Number: TUD-CS-2011-0079
Related URLs:
Export:
Suche nach Titel in: TUfind oder in Google
Send an inquiry Send an inquiry

Options (only for editors)

View Item View Item