Sciweavers

3395 search results - page 17 / 679
» Computational Differential Privacy
Sort
View
CCS
2008
ACM
13 years 12 months ago
Computationally sound mechanized proofs for basic and public-key Kerberos
Bruno Blanchet, Aaron D. Jaggard, Andre Scedrov, J...
ISI
2006
Springer
13 years 9 months ago
A Flexible and Scalable Access Control for Ubiquitous Computing Environments
Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungy...
ISI
2006
Springer
13 years 9 months ago
A Trust-Based Security Architecture for Ubiquitous Computing Systems
Hung Le Xuan, Pho Duc Giang, Yonil Zhung, Tran Van...
OOPSLA
2010
Springer
13 years 7 months ago
What can the GC compute efficiently?: a language for heap assertions at GC time
Christoph Reichenbach, Neil Immerman, Yannis Smara...
WISA
2010
Springer
13 years 7 months ago
A Two-Party Protocol with Trusted Initializer for Computing the Inner Product
Rafael Dowsley, Jeroen van de Graaf, Davidson Marq...