Sciweavers

182 search results - page 3 / 37
» The Secret Art of Computer Programming
Sort
View
CSUR
2011
12 years 12 months ago
Programming wireless sensor networks: Fundamental concepts and state of the art
high-level programming abstractions, capable of simplifying the programming chore without sacrificing efficiency, has been long recognized and several solutions have been hitherto...
Luca Mottola, Gian Pietro Picco
FSTTCS
2007
Springer
14 years 2 months ago
Computationally Sound Typing for Non-interference: The Case of Deterministic Encryption
Type systems for secure information flow aim to prevent a program from leaking information from variables that hold secret data to variables that hold public data. In this work we...
Judicaël Courant, Cristian Ene, Yassine Lakhn...
INDOCRYPT
2003
Springer
14 years 1 months ago
On Multiplicative Linear Secret Sharing Schemes
We consider both information-theoretic and cryptographic settings for Multi-Party Computation (MPC), based on the underlying linear secret sharing scheme. Our goal is to study the ...
Ventzislav Nikov, Svetla Nikova, Bart Preneel
ECOOPW
2000
Springer
14 years 23 hour ago
Reflection and Meta-level Architectures: State of the Art and Future Trends
Previous workshops on reflection both in ECOOP and in OOPSLA have pointed out the growing interest and importance of Reflection and Metalevel Architectures in the fields of program...
Walter Cazzola, Shigeru Chiba, Thomas Ledoux
CTRSA
2007
Springer
93views Cryptology» more  CTRSA 2007»
14 years 10 days ago
Human Identification Through Image Evaluation Using Secret Predicates
Abstract. The task of developing protocols for humans to securely authenticate themselves to a remote server has been an interesting topic in cryptography as a replacement for the ...
Hassan Jameel, Riaz Ahmed Shaikh, Heejo Lee, Sungy...