Sciweavers

1005 search results - page 123 / 201
» Practical Secure Function Evaluation
Sort
View
CCS
2003
ACM
14 years 3 months ago
On the performance, feasibility, and use of forward-secure signatures
Forward-secure signatures (FSSs) have recently received much attention from the cryptographic theory community as a potentially realistic way to mitigate many of the difficulties...
Eric Cronin, Sugih Jamin, Tal Malkin, Patrick Drew...
CADE
2009
Springer
14 years 11 months ago
Complexity of Fractran and Productivity
Abstract. In functional programming languages the use of infinite structures is common practice. For total correctness of programs dealing with infinite structures one must guarant...
Clemens Grabmayer, Dimitri Hendriks, Jörg End...
ICWS
2004
IEEE
13 years 11 months ago
A DAML-Based Repository for QoS-Aware Semantic Web Service Selection
The Web is moving toward a collection of interoperating Web services. Achieving this interoperability requires dynamic discovery of Web services on the basis of their capabilities...
A. Soydan Bilgin, Munindar P. Singh
JLP
2006
111views more  JLP 2006»
13 years 10 months ago
Executable structural operational semantics in Maude
This paper describes in detail how to bridge the gap between theory and practice when implementing in Maude structural operational semantics described in rewriting logic, where tr...
Alberto Verdejo, Narciso Martí-Oliet
ACSAC
2003
IEEE
14 years 1 months ago
Defending Embedded Systems Against Buffer Overflow via Hardware/Software
Buffer overflow attacks have been causing serious security problems for decades. With more embedded systems networked, it becomes an important research problem to defend embedded ...
Zili Shao, Qingfeng Zhuge, Yi He, Edwin Hsing-Mean...