Sciweavers

2290 search results - page 10 / 458
» Extensible Protected Types
Sort
View
CCS
2011
ACM
14 years 2 months ago
Information-flow types for homomorphic encryptions
We develop a flexible information-flow type system for a range of encryption primitives, precisely reflecting their diverse functional and security features. Our rules enable e...
Cédric Fournet, Jérémy Planul...
TCSV
2008
119views more  TCSV 2008»
15 years 2 months ago
Scalable Joint Source-Channel Coding for the Scalable Extension of H.264/AVC
This paper proposes a novel joint source-channel coding (JSCC) methodology which minimizes the end-to-end distortion for the transmission over packet loss channels of scalable vide...
Maryse R. Stoufs, Adrian Munteanu, Jan Cornelis, P...
POPL
1989
ACM
15 years 6 months ago
How to Make ad-hoc Polymorphism Less ad-hoc
raction that a programming language provides influences the structure and algorithmic complexity of the resulting programs: just imagine creating an artificial intelligence engine ...
Philip Wadler, Stephen Blott
127
Voted
ICFP
2006
ACM
16 years 2 months ago
Good advice for type-directed programming aspect-oriented programming and extensible generic functions
Type-directed programming is an important idiom for software design. In type-directed programming the behavior of programs is guided by the type structure of data. It makes it pos...
Geoffrey Washburn, Stephanie Weirich
COMCOM
2006
75views more  COMCOM 2006»
15 years 2 months ago
SSL/TLS session-aware user authentication - Or how to effectively thwart the man-in-the-middle
Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLSbased electronic commerce applications, such as Internet banking. In this paper, we argue that most deployed use...
Rolf Oppliger, Ralf Hauser, David A. Basin