Sciweavers

1816 search results - page 138 / 364
» Trace oblivious computation
Sort
View
CRYPTO
2008
Springer
98views Cryptology» more  CRYPTO 2008»
14 years 3 days ago
One-Time Programs
Abstract. In this work, we introduce one-time programs, a new computational paradigm geared towards security applications. A one-time program can be executed on a single input, who...
Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothbl...
CRYPTO
2010
Springer
188views Cryptology» more  CRYPTO 2010»
13 years 11 months ago
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
Homomorphic encryption (HE) schemes enable computing functions on encrypted data, by means of a public Eval procedure that can be applied to ciphertexts. But the evaluated ciphert...
Craig Gentry, Shai Halevi, Vinod Vaikuntanathan
TACAS
2012
Springer
277views Algorithms» more  TACAS 2012»
12 years 5 months ago
Proving Reachability Using FShell - (Competition Contribution)
FShell is an automated white-box test-input generator for C programs, computing test data with respect to user-specified code coverage criteria. The pillars of FShell are the decl...
Andreas Holzer, Daniel Kroening, Christian Schallh...
MT
1998
90views more  MT 1998»
13 years 10 months ago
The Origins of the Translator's Workstation
The first proposals for various component tools of what is now called the ‘translator’s workstation’ or ‘workbench’ are traced back to the 1970s and early 1980s in vario...
John Hutchins
SENSYS
2010
ACM
13 years 8 months ago
Privacy-aware regression modeling of participatory sensing data
Many participatory sensing applications use data collected by participants to construct a public model of a system or phenomenon. For example, a health application might compute a...
Hossein Ahmadi, Nam Pham, Raghu K. Ganti, Tarek F....