Sciweavers

1005 search results - page 12 / 201
» Practical Secure Function Evaluation
Sort
View
EUROPKI
2004
Springer
14 years 28 days ago
A Framework for Evaluating the Usability and the Utility of PKI-enabled Applications
Abstract. Besides the pure technical features, the usability of a PKIenabled application plays a crucial role since the best security application will fail in practice if its usabi...
Tobias Straub, Harald Baier
AINA
2004
IEEE
13 years 11 months ago
Using the Extension Function of XSLT and DSL to Secure XML Documents
XSLT is a very popular and flexible language for transforming XML documents which provides a powerful implementation of a tree-oriented transformation language for transmuting ins...
Tao-Ku Chang, Gwan-Hwan Hwang
CCS
2010
ACM
13 years 7 months ago
TASTY: tool for automating secure two-party computations
Secure two-party computation allows two untrusting parties to jointly compute an arbitrary function on their respective private inputs while revealing no information beyond the ou...
Wilko Henecka, Stefan Kögl, Ahmad-Reza Sadegh...
IFL
2000
Springer
135views Formal Methods» more  IFL 2000»
13 years 11 months ago
Freja, Hat and Hood - A Comparative Evaluation of Three Systems for Tracing and Debugging Lazy Functional Programs
Abstract. In this paper we compare three systems for tracing and debugging Haskell programs: Freja, Hat and Hood. We evaluate their usefulness in practice by applying them to a num...
Olaf Chitil, Colin Runciman, Malcolm Wallace
PEPM
2007
ACM
14 years 1 months ago
Poly-controlled partial evaluation in practice
Poly-Controlled Partial Evaluation (PCPE) is a powerful approach to partial evaluation, which has recently been proposed. PCPE takes into account sets of control strategies instea...
Claudio Ochoa, Germán Puebla