ACSC '01 Proceedings of the 24th Australasian conference on Computer science
Deterministic second-order patterns
Information Processing Letters
Monadification of functional programs
Science of Computer Programming - Special issue on program transformation
Metamorphisms: Streaming representation-changers
Science of Computer Programming
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Hi-index | 0.00 |