-
1
-
-
0041089975
-
On hiding information from an oracle
-
M. Abadi, J. Feigenbaum, J. Kilian, On Hiding Information from an Oracle, Journal of Computer and System Science, vol. 39, n. 1, pp. 21-50, 1989.
-
(1989)
Journal of Computer and System Science
, vol.39
, Issue.1
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
2
-
-
85028925878
-
Proof verification and hardness of approximation problems
-
S. Arora, C. Lund, R. Motwani, M. Sudan, M. Szegedy, Proof Verification and Hardness of Approximation Problems, Proc. of the 33rd IEEE FOCS, pp. 14-23, 1992.
-
(1992)
Proc. of the 33rd IEEE FOCS
, pp. 14-23
-
-
Arora, S.1
Lund, C.2
Motwani, R.3
Sudan, M.4
Szegedy, M.5
-
3
-
-
33746365751
-
Secure multiparty computation protocols and zero-knowledge proof systems tolerating a faulty minority
-
Springer
-
D. Beaver, Secure Multiparty Computation Protocols and Zero-Knowledge Proof Systems Tolerating a Faulty Minority, Journal of Cryptology, Springer, pp. 75-122, 1991.
-
(1991)
Journal of Cryptology
, pp. 75-122
-
-
Beaver, D.1
-
4
-
-
80054992065
-
Extensibility, safety and performance in the spin operating system
-
B. N. Bershad, S. Savage, P. Pardyak, E. G. Sirer, M. E. Fiuczynski, D. Becker, C. Chambers, S. Eggers, Extensibility, Safety and Performance in the Spin Operating System, Proc. of the 15th Symposium on Operating Systems Principles, 1995.
-
(1995)
Proc. of the 15th Symposium on Operating Systems Principles
-
-
Bershad, B.N.1
Savage, S.2
Pardyak, P.3
Sirer, E.G.4
Fiuczynski, M.E.5
Becker, D.6
Chambers, C.7
Eggers, S.8
-
5
-
-
0003153237
-
Non-interactive zero-knowledge and its application
-
(Extended Abstract)
-
M. Blum, P. Feldman, S. Micali, Non-Interactive Zero-Knowledge and Its Application (Extended Abstract), Proc. of the 20th ACM STOC, pp. 103-112, 1988.
-
(1988)
Proc. of the 20th ACM STOC
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
7
-
-
0346698930
-
Trust management and proof-carrying code in secure mobile-code applications
-
Monterey, CA, USA Position Paper
-
J. Feigenbaum, P. Lee, Trust Management and Proof-Carrying Code in Secure Mobile-Code Applications, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper.
-
(1997)
DARPA Workshop on Foundations for Secure Mobile Code
-
-
Feigenbaum, J.1
Lee, P.2
-
10
-
-
0001943763
-
Time limited blackbox security: Protecting mobile agents from malicious hosts
-
Giovanni Vigna (Ed.) Lecture Notes in Computer Science, Springer
-
F. Hohl, Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts, in: Giovanni Vigna (Ed.), Mobile Agents and Security, Lecture Notes in Computer Science, Springer, 1997.
-
(1997)
Mobile Agents and Security
-
-
Hohl, F.1
-
11
-
-
0347898492
-
Language support for extensible operating systems
-
W. C. Hsieh, M. E. Fiuczynski, C. Garrett, D. Becker, B. N. Bershad, Language Support for Extensible Operating Systems, Proc. of the Workshop on Compiler Support for System Software, 1996.
-
(1996)
Proc. of the Workshop on Compiler Support for System Software
-
-
Hsieh, W.C.1
Fiuczynski, M.E.2
Garrett, C.3
Becker, D.4
Bershad, B.N.5
-
12
-
-
84867318820
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz, R. Ostrovsky, Replication is Not Needed: Single Database, Computationally-Private Information Retrieval, Proc. of the 29th ACM STOC, 1997.
-
(1997)
Proc. of the 29th ACM STOC
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
13
-
-
0012361674
-
Research on proof-carrying code for mobile-code security
-
Monterey, CA, USA Position Paper
-
P. Lee, G. Necula, Research on Proof-Carrying Code For Mobile-Code Security, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper.
-
(1997)
DARPA Workshop on Foundations for Secure Mobile Code
-
-
Lee, P.1
Necula, G.2
-
14
-
-
85077206746
-
The bsd packet filter: A new architecture for user-level packet capture
-
S. McCanne, V. Jacobson, The bsd Packet Filter: A New Architecture for User-level Packet Capture, Proc. of the USENIX Technical Conference, pp. 259-269, 1993.
-
(1993)
Proc. of the USENIX Technical Conference
, pp. 259-269
-
-
McCanne, S.1
Jacobson, V.2
-
15
-
-
10844229866
-
Detecting attacks on mobile agents
-
CA, USA Position Paper
-
C. Meadows, Detecting Attacks on Mobile Agents, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper.
-
(1997)
DARPA Workshop on Foundations for Secure Mobile Code, Monterey
-
-
Meadows, C.1
-
18
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Giovanni Vigna (Ed.) Lecture Notes in Computer Science, Springer
-
T. Sander, C. T. Tschudin, Protecting Mobile Agents Against Malicious Hosts, in: Giovanni Vigna (Ed.), Mobile Agents and Security, Lecture Notes in Computer Science, Springer, 1997.
-
(1997)
Mobile Agents and Security
-
-
Sander, T.1
Tschudin, C.T.2
-
21
-
-
35248895700
-
Efficient software-based fault isolation
-
R. Wahbe, S. Lucco, T. E. Anderson, S. L. Graham, Efficient Software-based Fault Isolation, Proc. ACM SIGCOMM Symposium 1996, 1996.
-
(1996)
Proc. ACM SIGCOMM Symposium 1996
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
22
-
-
0005081338
-
A sanctuary for mobile agents
-
Monterey, CA, USA Position Paper
-
B. S. Yee, A Sanctuary for Mobile Agents, DARPA Workshop on Foundations for Secure Mobile Code, Monterey, CA, USA, 1997, Position Paper.
-
(1997)
DARPA Workshop on Foundations for Secure Mobile Code
-
-
Yee, B.S.1
|