Sciweavers

4731 search results - page 34 / 947
» Securing Interactive Programs
Sort
View
98
Voted
ICASSP
2008
IEEE
15 years 8 months ago
An interactive hybrid programming approach to signals and systems laboratory
Signals and systems lab courses that are currently offered at many universities are mostly based on textbased programming languages and environments, in particular MATLAB. This pa...
Nasser D. Kehtarnavaz, Philip Loizou, Mohammad Rah...
123
Voted
CCS
2011
ACM
14 years 2 months ago
Automatically optimizing secure computation
On the one hand, compilers for secure computation protocols, such as FairPlay or FairPlayMP, have significantly simplified the development of such protocols. On the other hand, ...
Florian Kerschbaum
118
Voted
POPL
1998
ACM
15 years 6 months ago
The SLam Calculus: Programming with Secrecy and Integrity
The SLam calculus is a typed -calculus that maintains security information as well as type information. The type system propagates security information for each object in four for...
Nevin Heintze, Jon G. Riecke
72
Voted
CHI
2008
ACM
16 years 2 months ago
Human, organizational, and technological factors of IT security
André Gagné, David Botta, Kasia Muld...
85
Voted
CASSIS
2004
Springer
15 years 7 months ago
A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices
William R. Bush, Antony Ng, Douglas N. Simon, Bern...