Sciweavers

3420 search results - page 116 / 684
» A Language-Based Approach to Security
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
Abstract—Wireless sensor networks are considered ideal candidates for a wide range of applications. It is desirable and sometimes necessary to reprogram sensor nodes through wire...
An Liu, Peng Ning, Chun Wang
ASIACRYPT
2005
Springer
15 years 9 months ago
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
We propose Gate Evaluation Secret Sharing (GESS) – a new kind of secret sharing, designed for use in secure function evaluation (SFE) with minimal interaction. The resulting simp...
Vladimir Kolesnikov
120
Voted
ICALP
2004
Springer
15 years 9 months ago
Deciding Knowledge in Security Protocols Under Equational Theories
The analysis of security protocols requires precise formulations of the knowledge of protocol participants and attackers. In formal approaches, this knowledge is often treated in t...
Martín Abadi, Véronique Cortier
125
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
MontiCore: a framework for the development of textual domain specific languages
In this paper we demonstrate a framework for efficient development of textual domain specific languages and supporting tools. We use a redundance-free and compact definition of le...
Bernhard Rumpe, Hans Grönniger, Holger Krahn,...
EMNLP
2007
15 years 5 months ago
Part-of-Speech Tagging for Middle English through Alignment and Projection of Parallel Diachronic Texts
We demonstrate an approach for inducing a tagger for historical languages based on existing resources for their modern varieties. Tags from Present Day English source text are pro...
Taesun Moon, Jason Baldridge