1
Published 2008
Table of Contents: ... in Thin Films and Superlattices -- Other Functional Materials -- Clays and Clay Minerals in Western High...
View full text
Electronic eBook
2
Published 2007
Table of Contents: ... Computing -- Traitor Tracing with Optimal Transmission Rate -- Symmetric-Key Cryptography -- The Security...
View full text
Electronic eBook
3
Table of Contents: ...and Definitions -- Definitions -- General Constructions -- Semi-honest Adversaries -- Malicious...
View full text
Electronic eBook
4
Published 2005
Table of Contents: ... -- Constructing Secure Proxy Cryptosystem -- Symmetric Key Mechanisms -- Towards a General RC4-Like Keystream...
View full text
Electronic eBook
5
Published 2013
Table of Contents: ... -- Robustness Analysis of Finite Precision Implementations -- A Hoare Logic for SIMT Programs -- The Undefined...
View full text
Electronic eBook
6
Published 2006
Table of Contents: ...) -- Access Control and Systems Security -- A Construction for General and Efficient Oblivious Commitment...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ... for Incremental Evaluation of Tabled Logic Programs -- Functional and Constraint Logic Programming -- Memory Reuse...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... Programming -- Computable Functions in ASP: Theory and Implementation -- Composing Normal Programs...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... Encodings and Dependent Types -- Functional and Logic Programming -- Programming in JoCaml (Tool...
View full text
Electronic eBook
11
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
12
Published 2006
Table of Contents: ... -- Generalized Compact Knapsacks Are Collision Resistant -- An Efficient Provable Distinguisher for HFE -- A...
View full text
Electronic eBook
13
Published 2007
Table of Contents: ... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... Computation -- Propositional Interpolation and Abstract Interpretation -- Functional Programming in Sublinear...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ... Minicast Secure Against General Adversaries....
View full text
Electronic eBook
16
Published 2010
Table of Contents: .... Semantics -- Game Semantics for Call-by-Value Polymorphism -- What Is a Pure Functional? -- Example-Guided...
View full text
Electronic eBook
17
Published 2012
Subjects: ...Logics and Meanings of Programs. https://scigraph.springernature.com/ontologies/product-market...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ...-Track A2. Security -- Online Network Design with Outliers -- Efficient Completely Non-malleable Public...
View full text
Electronic eBook
19
Published 2014
Table of Contents: ... Software with Recursive Functions (Invited Contribution) -- Track A: Algorithms, Complexity, and Games Weak...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ...) Expected Time -- Function Evaluation Via Linear Programming in the Priced Information Model -- Improved...
View full text
Electronic eBook