Sciweavers

1628 search results - page 42 / 326
» Compiler Construction Using Scheme
Sort
View
DCC
2007
IEEE
14 years 9 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
LREC
2008
109views Education» more  LREC 2008»
13 years 11 months ago
The Italian Particle "ne": Corpus Construction and Analysis
The Italian particle ne exhibits interesting anaphoric properties that have not been yet explored in depth from a corpus and computational linguistic perspective. We provide: (i) ...
Malvina Nissim, Sara Perboni
PLDI
2004
ACM
14 years 3 months ago
Fast searches for effective optimization phase sequences
It has long been known that a fixed ordering of optimization phases will not produce the best code for every application. One approach for addressing this phase ordering problem ...
Prasad Kulkarni, Stephen Hines, Jason Hiser, David...
GPCE
2007
Springer
14 years 4 months ago
Simple and safe SQL queries with c++ templates
Most software applications use a relational database for data management and storage. Interaction with such a database is often done by letting the program construct strings with ...
Joseph Gil, Keren Lenz
SCN
2010
Springer
144views Communications» more  SCN 2010»
13 years 8 months ago
Generic Constructions of Parallel Key-Insulated Encryption
Exposure of a secret key is a significant threat in practice. As a notion of security against key exposure, Dodis et al. advocated key-insulated security, and proposed concrete k...
Goichiro Hanaoka, Jian Weng