Sciweavers

2209 search results - page 107 / 442
» Language Based Secure Communication
Sort
View
OOPSLA
1989
Springer
15 years 9 months ago
A Denotational Semantics of Inheritance and its Correctness
This paper presents a denotational model of inheritance. The model is based on an intuitive motivation of inheritance as a mechanism for deriving modified versions of recursive d...
William R. Cook, Jens Palsberg
PKC
2010
Springer
119views Cryptology» more  PKC 2010»
15 years 6 months ago
Efficient Set Operations in the Presence of Malicious Adversaries
We revisit the problem of constructing efficient secure two-party protocols for the problems of setintersection and set-union, focusing on the model of malicious parties. Our main...
Carmit Hazay, Kobbi Nissim
ESORICS
2000
Springer
15 years 8 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
IPPS
1999
IEEE
15 years 9 months ago
Using Channels for Multimedia Communication
In this paper we present a paradigm to express streams and its implementation. Streams are a convenient mechanism to communicate multimedia data, for example video or audio, betwe...
David May, Henk L. Muller
CCS
2008
ACM
15 years 7 months ago
FairplayMP: a system for secure multi-party computation
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern cryptograp...
Assaf Ben-David, Noam Nisan, Benny Pinkas