Sciweavers

37217 search results - page 7434 / 7444
» or 2010
Sort
View
CADE
2011
Springer
12 years 8 months ago
Experimenting with Deduction Modulo
Deduction modulo is a generic framework to describe proofs in a theory better than using raw axioms. This is done by presenting the theory through rules rewriting terms and proposi...
Guillaume Burel
CCS
2011
ACM
12 years 8 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...
CCS
2011
ACM
12 years 8 months ago
SURF: detecting and measuring search poisoning
Search engine optimization (SEO) techniques are often abused to promote websites among search results. This is a practice known as blackhat SEO. In this paper we tackle a newly em...
Long Lu, Roberto Perdisci, Wenke Lee
CIKM
2011
Springer
12 years 8 months ago
An efficient method for using machine translation technologies in cross-language patent search
Topics in prior-art patent search are typically full patent applications and relevant items are patents often taken from sources in different languages. Cross language patent retr...
Walid Magdy, Gareth J. F. Jones
CRYPTO
2011
Springer
245views Cryptology» more  CRYPTO 2011»
12 years 8 months ago
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
We present a somewhat homomorphic encryption scheme that is both very simple to describe and analyze, and whose security (quantumly) reduces to the worst-case hardness of problems ...
Zvika Brakerski, Vinod Vaikuntanathan
« Prev « First page 7434 / 7444 Last » Next »