and Applications

Results: 31669



#Item
51Computing / Computer programming / Software engineering / Functional languages / High-level programming languages / Computer access control / Object-capability model / JavaScript / Heap / Topological space / Monad / Caja project

Object Capabilities and Isolation of Untrusted Web Applications Sergio Maffeis Imperial College London John C. Mitchell Stanford University

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2010-03-08 04:28:13
52

Building web applications on top of encrypted data using Mylar Raluca Ada Popa, Emily Stark,† Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, and Hari Balakrishnan MIT CSAIL and † Meteor Developme

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
    53

    Small Data: Applications and Architecture Cheng-Kang Hsieh∗ , Faisal Alquaddoomi† , Fabian Okeke‡ , John P. Pollak§ , Lucky Gunasekara¶ and Deborah Estrink ∗ UCLA CSD; Los Angeles, CA, USA (

    Add to Reading List

    Source URL: smalldata.io

    Language: English - Date: 2018-10-24 23:11:34
      54Temporal logic / Theoretical computer science / Mathematics / Linear temporal logic / Probabilistic CTL / Computation tree logic / Mathematical logic / Markov decision process / Markov chain / IP / Limit / Craig interpolation

      FT D RA Probabilistic Model Checking: Advances and Applications

      Add to Reading List

      Source URL: qav.comlab.ox.ac.uk

      Language: English - Date: 2017-05-03 06:06:10
      55Geometry / Geometric group theory / Mathematics / Group theory / Combinatorics on words / Geometric topology / Metric geometry / Dehn function / Quasi-isometry / Ultralimit / Presentation of a group / Finitely generated abelian group

      DEHN FUNCTION AND ASYMPTOTIC CONES OF ABELS’ GROUP YVES CORNULIER, ROMAIN TESSERA Abstract. We prove that Abels’ group over an arbitrary local field has a quadratic Dehn function. As applications, we exhibit connecte

      Add to Reading List

      Source URL: www.normalesup.org

      Language: English - Date: 2012-03-03 14:33:06
      56Cryptography / Computational complexity theory / Zero-knowledge proof / Zero knowledge / Interactive proof system / IP / NP / Cryptographic protocol / Proof of knowledge / Oblivious transfer

      Cryptology and Its Applications Nordic Research Training course, Bergen Zero knowledge and some applications Helger Lipmaa

      Add to Reading List

      Source URL: kodu.ut.ee

      Language: English - Date: 2008-09-12 11:33:08
      57Mathematical analysis / Mathematics / Geometry / Metric geometry / Sobolev spaces / Inequalities / Function spaces / Measure theory / Sobolev inequality / Metric space / Lp space / Quasi-isometry

      Large scale Sobolev inequalities on metric measure spaces and applications. Romain Tessera October 29, 2010 Abstract For functions on a metric measure space, we introduce a notion of

      Add to Reading List

      Source URL: www.normalesup.org

      Language: English - Date: 2010-10-28 18:34:34
      58Cryptography / Public-key cryptography / Digital signature / Signcryption / Key / ID-based encryption / RSA / Encryption

      A preliminary version of this paper appears in the proceedings of EurocryptThis is the full version, which appears as IACR ePrint Archive RecordKey-Versatile Signatures and Applications: RKA, KDM and Jo

      Add to Reading List

      Source URL: smeiklej.com

      Language: English - Date: 2018-10-23 14:58:02
      59Computing / Cryptography / Internet / Internet protocols / Computer access control / Internet Standards / Cryptographic protocols / Time-based One-time Password algorithm / Password / Salted Challenge Response Authentication Mechanism / Yahoo! Messenger Protocol

      A Single-Sign-On Security Platform for Private and Decentralized Applications William Swanson, Paul Puey The Edge platform (formerly Airbitz) implements a client-side encrypted, peer-to-peer synchronized, and backed up d

      Add to Reading List

      Source URL: edge.app

      Language: English - Date: 2018-09-12 15:47:22
      60Boolean algebra / Constraint programming / Diagrams / Binary decision diagram / Model checking / Theoretical computer science / Mathematics / Local consistency / Computing / Propositional directed acyclic graph

      BDDs for Pseudo-Boolean Constraints – Revisited Ignasi Ab´ıo, Robert Nieuwenhuis, Albert Oliveras, and Enric Rodr´ıguez-Carbonell? Abstract. Pseudo-Boolean constraints are omnipresent in practical applications, and

      Add to Reading List

      Source URL: www.lsi.upc.edu

      Language: English - Date: 2011-11-02 09:48:19
      UPDATE