h1

h2

h3

h4

h5
h6
http://join2-wiki.gsi.de/foswiki/pub/Main/Artwork/join2_logo100x88.png

Analysing Cryptographically-Masked Information Flows in MILS-AADL Specifications

;

In
[embeddedworld Exibition & Conference, 2017-03-14 - 2017-03-16, Nuremberg, Germany], Seiten/Artikel-Nr: 5 Seiten

Konferenz/Event:embeddedworld Exibition & Conference , Nuremberg , Germany , 2017-03-14 - 2017-03-16

: Zenodo

Umfang5 Seiten

Online
DOI: 10.5281/zenodo.571173
DOI: 10.18154/RWTH-CONV-220392
URL: http://publications.rwth-aachen.de/record/713571/files/713571.pdf

Einrichtungen

  1. Lehrstuhl für Informatik 2 (Softwaremodellierung und Verifikation) (121310)
  2. Fachgruppe Informatik (120000)

OpenAccess:
Download fulltext PDF

Dokumenttyp
Contribution to a conference proceedings

Format
online, print

Sprache
English

Interne Identnummern
RWTH-CONV-220392
Datensatz-ID: 713571

Beteiligte Länder
Germany

 GO


Creative Commons Attribution CC BY 4.0 ; OpenAccess

QR Code for this record

The record appears in these collections:
Document types > Events > Contributions to a conference proceedings
Faculty of Mathematics, Computer Science and Natural Sciences (Fac.1) > Department of Computer Science
Publication server / Open Access
Public records
Publications database
120000
121310

 Record created 2018-02-08, last modified 2023-02-14


OpenAccess:
Download fulltext PDF
Rate this document:

Rate this document:
1
2
3
 
(Not yet reviewed)