自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+
  • 博客(0)
  • 资源 (14)
  • 收藏
  • 关注

空空如也

djvu viewer

djvu viewer djvu viewer djvu viewer

2011-05-02

A paper about program analysis

Program analysis. Program analysis. Program analysis. Program analysis. Program analysis. To help share, there will be reurned bonus.

2011-05-02

Algorithms-seriese

Algorithm and Complexity. Perhapse an average-refered one, with its styles. Algorithm and Complexity. Algorithm and Complexity. Algorithm and Complexity. Algorithm and Complexity. Algorithm and Complexity. Algorithm and Complexity.

2011-05-02

netants_downloading-software

netants netants netants netants netants netants netants

2011-05-02

TCG software stack

TCG software stack; TCG software stack; TCG software stack; TCG software stack; TCG software stack. An important part for which much analysis work might be planned to do.

2010-10-14

Principles of model checking

model checking; had better buy one. formal methods for mission-critical software development. formal methods for mission-critical software development. formal methods for mission-critical software development.

2010-10-14

July-Vista-Integrity-Techniques

The vista trustworthy wares and related techniques. The vista trustworthy wares and related techniques. The vista trustworthy wares and related techniques.

2010-10-14

Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2

resource meterial able to be acquired freely. Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2 Protection Profile PC Client Specific Trusted Platform Module TPM Family 1.2, Level 2

2010-10-14

PRISM: Enabling Personal Verification of Code Integrity, untampered execution, and Trusted I/O on legacy systems

PRISM: Enabling Personal Verification of Code Integrity, untampered execution, and Trusted I/O on legacy systems. One in the seriese of work by Mark Ryan on trusted computing.

2010-10-14

Formal verification or certification related

Symbolic bisimulation of the applied pi-calculus; formal methodes for mobile systems communiciation. Symbolic bisimulation of the applied pi-calculus; formal methodes for mobile systems communiciation. Symbolic bisimulation of the applied pi-calculus; formal methodes for mobile systems communiciation.

2010-10-14

trust integrity measurement and reporting for virtualized platforms

trust integrity measurement and reporting trust integrity measurement and reporting trust integrity measurement and reporting

2010-09-30

offline dictionary attack on TCG TPM weak authorization data, and solution

maybe a good portal to research on tcp tpm. a point in line with a researcher in hp labs.

2010-09-30

papers about formal verification

toward the verification of persive systems. you can find this paper is on a project supervisized by professor Mark Ryan atl. It is on the issue of verification of protocols.

2010-09-30

dos71scd.zip

dos71scd.zip dos71scd.zip dos71scd.zip dos71scd.zip dos71scd.zip dos71scd.zip dos71scd.zip

2010-08-25

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除