Sciweavers

503 search results - page 24 / 101
» Authenticity by tagging and typing
Sort
View
ICFP
2001
ACM
14 years 8 months ago
A Dependently Typed Assembly Language
We present a dependently typed assembly language (DTAL) in which the type system supports the use of a restricted form of dependent types, reaping some benefits of dependent types...
Hongwei Xi, Robert Harper
ACL
2008
13 years 10 months ago
Enhancing Performance of Lexicalised Grammars
This paper describes how external resources can be used to improve parser performance for heavily lexicalised grammars, looking at both robustness and efficiency. In terms of robu...
Rebecca Dridan, Valia Kordoni, Jeremy Nicholson
ESOP
2003
Springer
14 years 1 months ago
Tagging, Encoding, and Jones Optimality
A partial evaluator is said to be Jones-optimal if the result of specializing a self-interpreter with respect to a source program is textually identical to the source program, modu...
Olivier Danvy, Pablo E. Martínez Lóp...
ASIACRYPT
2009
Springer
14 years 22 days ago
Proofs of Storage from Homomorphic Identification Protocols
Proofs of storage (PoS) are interactive protocols allowing a client to verify that a server faithfully stores a file. Previous work has shown that proofs of storage can be constru...
Giuseppe Ateniese, Seny Kamara, Jonathan Katz
ASIACRYPT
2007
Springer
14 years 22 days ago
On Efficient Message Authentication Via Block Cipher Design Techniques
In an effort to design a MAC scheme that is built using block cipher components and runs faster than the modes of operation for message authentication, Daemen and Rijmen have propo...
Goce Jakimoski, K. P. Subbalakshmi