Sciweavers

5476 search results - page 3 / 1096
» Resettably Secure Computation
Sort
View
OOPSLA
2010
Springer
15 years 1 months ago
Patterns and statistical analysis for understanding reduced resource computing
Martin C. Rinard, Henry Hoffmann, Sasa Misailovic,...
FSTTCS
2010
Springer
15 years 1 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 3 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
MOC
2010
14 years 10 months ago
Computing a lower bound for the canonical height on elliptic curves over number fields
Computing a lower bound for the canonical height is a crucial step in determining a Mordell
Thotsaphon Thongjunthug
OOPSLA
2010
Springer
15 years 1 months ago
What can the GC compute efficiently?: a language for heap assertions at GC time
Christoph Reichenbach, Neil Immerman, Yannis Smara...