1
Published 2015
Table of Contents: ...Type Systems -- Program analysis and Transformation -- Programming-language semantics -- Security...
View full text
Electronic eBook
2
Published 2012
Subjects: ...Programming languages (Electronic computers)....
View full text
Electronic eBook
3
Published 2010
Table of Contents: ...Invited Talks -- The Algorithmics of Solitaire-Like Games -- Compositionality of Secure Information...
View full text
Electronic eBook
4
Published 2006
Subjects: ...Computer programming....
View full text
Electronic eBook
5
Published 2005
Table of Contents: ...Mobile Resource Guarantees for Smart Devices -- History-Based Access Control and Secure Information...
View full text
Electronic eBook
6
Table of Contents: ...and Definitions -- Definitions -- General Constructions -- Semi-honest Adversaries -- Malicious...
View full text
Electronic eBook
7
Published 2006
Table of Contents: ...Invited Papers -- Differential Privacy -- The One Way to Quantum Computation -- Zero-Knowledge...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ...Invited Lectures -- Composable Formal Security Analysis: Juggling Soundness, Simplicity...
View full text
Electronic eBook
9
Published 2008
Table of Contents: ... Integer Programs with Choices -- Upper Bounds on the Noise Threshold for Fault-Tolerant Quantum Computing...
View full text
Electronic eBook
10
Published 2007
Table of Contents: ... -- Equational Systems and Free Constructions (Extended Abstract) -- Categorical Views on Computations on Trees...
View full text
Electronic eBook
11
Published 2014
Table of Contents: ... Small Local Memory -- Lower Bounds for Oblivious Subspace Embedding -- Secure Computation Using Leaky...
View full text
Electronic eBook
12
Published 2014
Table of Contents: ...Composable Transactional Objects: A Position Paper -- Application-Scale Secure Multiparty...
View full text
Electronic eBook
13
Subjects: ...Computer programming....
View full text
Electronic eBook
14
Published 2013
Table of Contents: ... Type System Improves a Foundational Program Verifier -- Computational Verification of Network Programs...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... -- Improved Fault Tolerance and Secure Computation on Sparse Networks -- Sparse Reliable Graph Backbones...
View full text
Electronic eBook
16
Published 2010
Table of Contents: ...: Efficient Verification via Secure Computation -- Session 3-Track A1. Data Structures -- Mergeable...
View full text
Electronic eBook
17
Published 2014
Table of Contents: ... for Communication-Safe Component Systems.- Constructive Collisions.- Let’s Get Physical: Computer Science Meets...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... and Languages for Web Services -- Structured Communication-Centred Programming for Web Services -- CC-Pi: A...
View full text
Electronic eBook
19
Published 2014
Table of Contents: ... Construction of Program Representations for Sparse Dataflow Analyses -- Inter-iteration Scalar Replacement...
View full text
Electronic eBook
20
Published 2008
Table of Contents: ... -- ML Modules and Haskell Type Classes: A Constructive Comparison -- The Essence of Form Abstraction...
View full text
Electronic eBook