Found: 2
Select item for more details and to access through your institution.
Cross-architecture bug search in binary executables.
- Published in:
- IT: Information Technology, 2017, v. 59, n. 2, p. 83, doi. 10.1515/itit-2016-0040
- By:
- Publication type:
- Article
SECURITY ANALYSIS OF MOBILE TWO-FACTOR AUTHENTICATION SCHEMES.
- Published in:
- Intel Technology Journal, 2014, v. 18, n. 4, p. 138
- By:
- Publication type:
- Article