Sciweavers

5476 search results - page 3 / 1096
» Resettably Secure Computation
Sort
View
67
Voted
OOPSLA
2010
Springer
14 years 9 months ago
Patterns and statistical analysis for understanding reduced resource computing
Martin C. Rinard, Henry Hoffmann, Sasa Misailovic,...
119
Voted
FSTTCS
2010
Springer
14 years 9 months ago
Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
ionally Sound Abstraction and Verification of Secure Multi-Party Computations Michael Backes Saarland University MPI-SWS Matteo Maffei Saarland University Esfandiar Mohammadi Saarl...
Michael Backes, Matteo Maffei, Esfandiar Mohammadi
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
14 years 11 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
94
Voted
MOC
2010
14 years 6 months ago
Computing a lower bound for the canonical height on elliptic curves over number fields
Computing a lower bound for the canonical height is a crucial step in determining a Mordell
Thotsaphon Thongjunthug
91
Voted
OOPSLA
2010
Springer
14 years 9 months ago
What can the GC compute efficiently?: a language for heap assertions at GC time
Christoph Reichenbach, Neil Immerman, Yannis Smara...