Sciweavers

248 search results - page 32 / 50
» Authentication Primitives and Their Compilation
Sort
View
IJNSEC
2007
154views more  IJNSEC 2007»
14 years 9 months ago
Integrity of mobile agents: a new approach
The recent developments in the mobile technology (mobile phones, middleware) created a need for new methods of protecting the code transmitted through the network. The oldest and ...
Aneta Zwierko, Zbigniew Kotulski
TCC
2004
Springer
105views Cryptology» more  TCC 2004»
15 years 3 months ago
Unfair Noisy Channels and Oblivious Transfer
In a paper from EuroCrypt’99, Damg˚ard, Kilian and Salvail show various positive and negative results on constructing Bit Commitment (BC) and Oblivious Transfer (OT) from Unfair...
Ivan Damgård, Serge Fehr, Kirill Morozov, Lo...
PPPJ
2003
ACM
15 years 3 months ago
A new approach for implementing stand-alone and Web-based interpreters for Java
Compared to imperative programming languages like Pascal or Basic, or functional programming languages like ML or Haskell learning Java is hampered by the fact that to get even th...
Stephan Diehl, Claudia Bieg
PLDI
2010
ACM
15 years 3 months ago
Bamboo: a data-centric, object-oriented approach to many-core software
Traditional data-oriented programming languages such as dataflow s and stream languages provide a natural abstraction for parallel programming. In these languages, a developer fo...
Jin Zhou, Brian Demsky
IFL
1997
Springer
153views Formal Methods» more  IFL 1997»
15 years 2 months ago
Common Subexpressions Are Uncommon in Lazy Functional Languages
Common subexpression elimination is a well-known compiler optimisation that saves time by avoiding the repetition of the same computation. In lazy functional languages, referential...
Olaf Chitil