Sciweavers

2209 search results - page 108 / 442
» Language Based Secure Communication
Sort
View
IFIP
2007
Springer
15 years 11 months ago
Lessons Learned from the Maroochy Water Breach
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and control operations in electrical power distribution facilities, oil and gas pipelines, water...
Jill Slay, Michael Miller
ICC
2007
IEEE
100views Communications» more  ICC 2007»
15 years 11 months ago
S.T.R.E.S.S. : Stress Testing and Reverse Engineering for System Security
— In modern wireless networks the functions included into layer II have to deal with complex problems, such as security and access control, that were previously demanded to upper...
Matteo Rosi, Leonardo Maccari, Romano Fantacci
MA
1997
Springer
127views Communications» more  MA 1997»
15 years 9 months ago
The Architecture of the Ara Platform for Mobile Agents
: We describe a platform for the portable and secure execution of mobile agents written in various interpreted languages on top of a common run-time core. Agents may migrate at any...
Holger Peine, Torsten Stolpmann
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
15 years 11 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
OOPSLA
2007
Springer
15 years 11 months ago
Living it up with a live programming language
A dynamic language improves programmer productivity through flexible typing, a focus on high-level programming, and by streamlining the edit-compile-debug cycle. Live languages g...
Sean McDirmid