1
Published 2008
Table of Contents: ... of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs...
View full text
Electronic eBook
2
Published 2005
Table of Contents: ... Can Prove So Many Things in Zero-Knowledge -- Identity Based Cryptography -- Improvements on Security...
View full text
Electronic eBook
3
Published 2005
Table of Contents: ... of Security/Primitives -- Relationships Between Diffie-Hellman and “Index Oracles” -- On the Security Notions...
View full text
Electronic eBook
4
Published 2006
Table of Contents: ... -- Oblivious Scalar-Product Protocols -- On Optimizing the k-Ward Micro-aggregation Technique for Secure...
View full text
Electronic eBook
5
Published 2008
Table of Contents: ... Revisited: Semantics and Representation of Aggregates -- Compiling Fuzzy Answer Set Programs to Fuzzy...
View full text
Electronic eBook
6
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
7
Published 2007
Table of Contents: ... on Write-Once Memories -- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... -- Aggregates for CHR through Program Transformation -- Preserving Sharing in the Partial Evaluation of Lazy...
View full text
Electronic eBook
9
Published 2015
Table of Contents: ... Transaction Logic -- On Compiling Linear Logic Programs with Comprehensions, Aggregates and Rule...
View full text
Electronic eBook
10
Published 2014
Table of Contents: ... and Certified Linked Implementation Using Orbits -- A Verified Generate-Test-Aggregate Coq Library for Parallel...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ... Filtering -- An AI-Based Causal Strategy for Securing Statistical Databases Using Micro-aggregation...
View full text
Electronic eBook
12
Published 2012
Table of Contents: ... -- Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing -- The Generalized...
View full text
Electronic eBook
13
Published 2015
Table of Contents: ...Universal Signature Aggregators -- Fully Structure-Preserving Signatures and Shrinking Commitments...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Oscillation of Motion Predicting Function -- Security of Virtualized Applications: Microsoft App-V and VMware...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ...Hash Function Cryptanalysis -- Security of MD5 Challenge and Response: Extension of APOP Password...
View full text
Electronic eBook
16
Published 2006
Table of Contents: ... Protocols with a Leader -- On Self-stabilizing Search Trees -- Efficient Dynamic Aggregation -- Groupings...
View full text
Electronic eBook
17
Table of Contents: ... -- CLR Stored Procedures -- User-Defined Functions -- User-Defined Types -- User-Defined Aggregates...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... Sensor Networks -- Approaching the Optimal Schedule for Data Aggregation in Wireless Sensor Networks...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ...Invited Talks -- Regular Labelings and Geometric Structures -- Algorithmic Aspects of Secure...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ...-Aggregates of Primary Spherical Particules by Radial Distribution Functions....
View full text
Electronic eBook