-
2
-
-
84880084787
-
-
research.microsoft.com/en-us/um/redmond/projects/z3
-
Z3 theorem prover. research.microsoft.com/en-us/um/redmond/projects/z3.
-
Z3 Theorem Prover
-
-
-
3
-
-
24144449674
-
Secure computation of the k th-ranked element
-
Springer
-
G. Aggarwal, N. Mishra, and B. Pinkas. Secure computation of the k th-ranked element. In EUROCRYPT. Springer, 2004.
-
(2004)
EUROCRYPT
-
-
Aggarwal, G.1
Mishra, N.2
Pinkas, B.3
-
4
-
-
4944265699
-
Secure information flow by self-composition
-
G. Barthe, P. R. D'Argenio, and T. Rezk. Secure information flow by self-composition. In CSFW, 2004.
-
(2004)
CSFW
-
-
Barthe, G.1
D'Argenio, P.R.2
Rezk, T.3
-
5
-
-
77954739043
-
The round complexity of secure protocols
-
D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols. In STOC, 1990.
-
(1990)
STOC
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
6
-
-
70349266254
-
Fairplaymp: A system for secure multi-party computation
-
A. Ben-David, N. Nisan, and B. Pinkas. FairplayMP: A system for secure multi-party computation. In CCS, 2008.
-
(2008)
CCS
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
7
-
-
77957606221
-
Required information release
-
S. Chong. Required information release. In CSF, 2010.
-
(2010)
CSF
-
-
Chong, S.1
-
10
-
-
67650336319
-
A decision procedure for bit-vectors and arrays
-
V. Ganesh and D. L. Dill. A decision procedure for bit-vectors and arrays. In CAV, 2007.
-
(2007)
CAV
-
-
Ganesh, V.1
Dill, D.L.2
-
13
-
-
84868249595
-
Privacy-preserving applications on smartphones
-
Y. Huang, P. Chapman, and D. Evans. Privacy-preserving applications on smartphones. In HOTSEC, 2011.
-
(2011)
HOTSEC
-
-
Huang, Y.1
Chapman, P.2
Evans, D.3
-
15
-
-
80755169442
-
Automatically optimizing secure computation
-
F. Kerschbaum. Automatically optimizing secure computation. In CCS, 2011.
-
(2011)
CCS
-
-
Kerschbaum, F.1
-
16
-
-
0016971687
-
Symbolic execution and program testing
-
J. C. King. Symbolic execution and program testing. Commun. ACM, 19(7):385-394, 1976.
-
(1976)
Commun. ACM
, vol.19
, Issue.7
, pp. 385-394
-
-
King, J.C.1
-
17
-
-
85183787592
-
-
LLVM. http://llvm.org.
-
LLVM
-
-
-
19
-
-
0348017041
-
Information flow inference for ml
-
Jan.
-
F. Pottier and V. Simonet. Information flow inference for ML. ACM TOPLAS, 25(1):117-158, Jan. 2003.
-
(2003)
ACM TOPLAS
, vol.25
, Issue.1
, pp. 117-158
-
-
Pottier, F.1
Simonet, V.2
-
20
-
-
51749106501
-
Language-based informationflow security
-
A. Sabelfeld and A. C. Myers. Language-based informationflow security. IEEE JSAC, 2003.
-
(2003)
IEEE JSAC
-
-
Sabelfeld, A.1
Myers, A.C.2
-
22
-
-
70450231636
-
Program verification using templates over predicate abstraction
-
S. Srivastava and S. Gulwani. Program verification using templates over predicate abstraction. In PLDI, 2009.
-
(2009)
PLDI
-
-
Srivastava, S.1
Gulwani, S.2
-
23
-
-
0022882770
-
How to generate and exchange secrets
-
A. C.-C. Yao. How to generate and exchange secrets. In FOCS, 1986.
-
(1986)
FOCS
-
-
Yao, A.C.-C.1
-
24
-
-
0038559280
-
Untrusted hosts and confidentiality: Secure program partitioning
-
S. Zdancewic, L. Zheng, N. Nystrom, and A. C. Myers. Untrusted hosts and confidentiality: secure program partitioning. In SOSP, 2001.
-
(2001)
SOSP
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|