Gotowa bibliografia na temat „Secure Compilation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Secure Compilation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Secure Compilation"
Vu, Son Tuan, Albert Cohen, Arnaud De Grandmaison, Christophe Guillon i Karine Heydemann. "Reconciling optimization with secure compilation". Proceedings of the ACM on Programming Languages 5, OOPSLA (20.10.2021): 1–30. http://dx.doi.org/10.1145/3485519.
Pełny tekst źródłaPatrignani, Marco, Amal Ahmed i Dave Clarke. "Formal Approaches to Secure Compilation". ACM Computing Surveys 51, nr 6 (27.02.2019): 1–36. http://dx.doi.org/10.1145/3280984.
Pełny tekst źródłaPatrignani, Marco, i Deepak Garg. "Robustly Safe Compilation, an Efficient Form of Secure Compilation". ACM Transactions on Programming Languages and Systems 43, nr 1 (kwiecień 2021): 1–41. http://dx.doi.org/10.1145/3436809.
Pełny tekst źródłaPatrignani, Marco, Pieter Agten, Raoul Strackx, Bart Jacobs, Dave Clarke i Frank Piessens. "Secure Compilation to Protected Module Architectures". ACM Transactions on Programming Languages and Systems 37, nr 2 (16.04.2015): 1–50. http://dx.doi.org/10.1145/2699503.
Pełny tekst źródłaAbate, Carmine, Roberto Blanco, Ştefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hritţcu, Marco Patrignani, Éric Tanter i Jérémy Thibault. "An Extended Account of Trace-relating Compiler Correctness and Secure Compilation". ACM Transactions on Programming Languages and Systems 43, nr 4 (31.12.2021): 1–48. http://dx.doi.org/10.1145/3460860.
Pełny tekst źródłaAndrici, Cezar-Constantin, Ștefan Ciobâcă, Cătălin Hriţcu, Guido Martínez, Exequiel Rivas, Éric Tanter i Théo Winterhalter. "Securing Verified IO Programs Against Unverified Code in F*". Proceedings of the ACM on Programming Languages 8, POPL (5.01.2024): 2226–59. http://dx.doi.org/10.1145/3632916.
Pełny tekst źródłaBlanton, Marina, Dennis Murphy i Chen Yuan. "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits". Proceedings on Privacy Enhancing Technologies 2024, nr 1 (styczeń 2024): 74–97. http://dx.doi.org/10.56553/popets-2024-0006.
Pełny tekst źródłaG, Selvakumar. "A Novel Approach for Remote Compilation using Docker Containers". International Journal of Computer Communication and Informatics 1, nr 1 (30.05.2019): 46–51. http://dx.doi.org/10.34256/ijcci1918.
Pełny tekst źródłaJawade, Prashant Balkrishna, i S. Ramachandram. "Multi-objective secure task scheduling based on SLA in multi-cloud environment". Multiagent and Grid Systems 18, nr 1 (23.05.2022): 65–85. http://dx.doi.org/10.3233/mgs-220362.
Pełny tekst źródłaZhang, Denghui, Lijing Ren i Zhaoquan Gu. "Enhancing the Privacy of Network Services through Trusted Computing". Applied Sciences 12, nr 18 (14.09.2022): 9191. http://dx.doi.org/10.3390/app12189191.
Pełny tekst źródłaRozprawy doktorskie na temat "Secure Compilation"
Raimondi, Gautier. "Secure compilation against side channel attacks". Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. http://www.theses.fr/2023URENS094.
Pełny tekst źródłaGiven their ubiquity, the security of computer systems is a major issue. In this thesis, we aim to guarantee security against a certain type of attack: timing side-channel attacks. These attacks use the execution time of a program to deduce information about the system. In particular, a program is said to be constant-time when it is not sensitive to this type of attack. This requires constraints on the program, which must neither make decisions using secret values, nor use one of these secrets to access memory. In this document, we present a method for guaranteeing the constant-time property of a program. This method is a high-level transformation, followed by compilation using Jasmin to preserve the property. We also present a proof of the security and semantic preservation of this method
Zinzindohoué-Marsaudon, Jean-Karim. "Secure, fast and verified cryptographic applications : a scalable approach". Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE052/document.
Pełny tekst źródłaThe security of Internet applications relies crucially on the secure design and robust implementations of cryptographic algorithms and protocols. This thesis presents a new, scalable and extensible approach for verifying state-of-the-art bignum algorithms, found in popular cryptographic implementations. Our code and proofs are written in F∗, a proof-oriented language which offers a very rich and expressive type system. The natural way of writing and verifying higher-order functional code in F∗ prioritizes code sharing and proof composition, but this results in low performance for cryptographic code. We propose a new language, Low∗, a fragment of F∗ which can be seen as a shallow embedding of C in F∗ and safely compiled to C code. Nonetheless, Low∗ retains the full expressiveness and verification power of the F∗ system, at the specification and proof level. We use Low∗ to implement cryptographic code, incorporating state-of-the-art optimizations from existing C libraries. We use F∗ to verify this code for functional correctness, memory safety and secret in- dependence. We present HACL∗, a full-fledged and fully verified cryptographic library which boasts performance on par, if not better, with the reference C code. Several algorithms from HACL∗ are now part of NSS, Mozilla’s cryptographic library, notably used in the Firefox web browser and the Red Hat operating system. Eventually, we apply our techniques to miTLS, a verified implementation of the Transport Layer Security protocol. We show how they extend to cryptographic proofs, state-machine implementations and message parsing verification
Büscher, Niklas [Verfasser], Stefan [Akademischer Betreuer] Katzenbeisser i Florian [Akademischer Betreuer] Kerschbaum. "Compilation for More Practical Secure Multi-Party Computation / Niklas Büscher ; Stefan Katzenbeisser, Florian Kerschbaum". Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2018. http://d-nb.info/1179361792/34.
Pełny tekst źródłaScherer, Oliver [Verfasser], i V. [Akademischer Betreuer] Hagenmeyer. "Engineering of Reliable and Secure Software via Customizable Integrated Compilation Systems / Oliver Scherer ; Betreuer: V. Hagenmeyer". Karlsruhe : KIT-Bibliothek, 2021. http://d-nb.info/1238148239/34.
Pełny tekst źródłaPlanul, Jeremy. "Typage, compilation, et cryptographie pour la programmation repartie securisée". Phd thesis, Ecole Polytechnique X, 2012. http://pastel.archives-ouvertes.fr/pastel-00685356.
Pełny tekst źródłaBüscher, Niklas. "Compilation for More Practical Secure Multi-Party Computation". Phd thesis, 2018. https://tuprints.ulb.tu-darmstadt.de/8495/1/thesis_nbuescher_1.0.pdf.
Pełny tekst źródłaCheng, Yu-Ju, i 鄭育如. "A Study of the Compilation of Mao Jin's Jin Dai "Secret" Books and A Selected Version Analysis of Its Collection". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/63541603394235326586.
Pełny tekst źródła國立臺北大學
古典文獻學研究所
97
Mao Jin(1599-1659)is a renowned private book collector of the late Ming Dynasty. His outstanding achievements of a lifetime find expression in his Jigu Library Hall acquisition, his textual criticism of ancient books and his manuscript editing and block printing of them. Of these, The Jin Dai "Secret" Books is a collection of rare and extraordinary books encompassing all the Four Categories. And Xiaoxue ganzhu (a book about lesser learning by Wang Yinglin of the Sung Dynasty), Jindai shu (a book about local seasonal customs and activities by Hsiao tung of the Southern Dynasty of Liang) and Suihua jili (also about local seasonal customs and activities) were rare ancient books of very small circulation in Mao Jin’s time. They got to spread far and wide only after the publication of The Jin Dai "Secret" Books. Furthermore, when he compiled it for publication, Mao Jin laid special emphasis on the complete versions of its collection and prudently chose rare books and old editions for this purpose. Thus, The Jin Dai "Secret" Books represents, in a sense, the crown achievement of the Jigu Library Hall block-printed editions. It is far more valuable than what was published by booksellers of Mao Chin’s time and is no less than the icon of series of higher quality in the Ming Dynasty. This thesis focuses on two main themes: related literature on Mao Jin’s compilation of The Jin Dai "Secret" Books and a selected analysis of its collection. It consists of six chapters: Chapter 1 “Introduction” first explains the purpose of this thesis, then summarizes the results of previous studies and goes on to illustrate the scope and methodology of the research. Chapter 2 “The Story of Mao Jin’s Life, His Associations and His Achievements in Book Collection and Printing” tells the story of Mao’s life and illustrates his important associations as a lead for the understanding of the background to his career in book collection and publishing and his achievements in these fields. Chapter 3 “The Compilation of The Jin Dai "Secret" Books” examines the background to its compilation, the format in its compilation and printing, how the books were collected, special features of its layout and the circulation of the edition and its impact. Chapter 4 and Chapter 5 “A Selected Version Analysis of the Collection of The Jin Dai "Secret" Books (Part I &Part II, respectively)” look into certain titles included in The Jin Dai "Secret" Books with an aim to sort out the origins of their versions while conducting some textual criticism of them in comparison with other existing important series editions to check their quality and judge the value of their versions. In question are Za jia (the Miscellaneous schools), Lei shu (Encyclopedias) and Xiao shuo jia (Story tellers) under the Category of Zi (Masters or Philosophers), as well as Bie ji (Individual collections) under the Category of Ji (Collections). Chapter 6 “Conclusion” makes a summary of the features, value and drawbacks of The Jin Dai "Secret" Books and gives it a fair integral evaluation to highlight its value as literature and its academic standing, based on the results of this research.
Książki na temat "Secure Compilation"
Büscher, Niklas, i Stefan Katzenbeisser. Compilation for Secure Multi-party Computation. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0.
Pełny tekst źródłaKuvarika, Sekai. Acting to secure children's rights: Legal protection and recourse : a case study compilation and call to action : evidence from the work of Justice for Children Trust. Harare: Tatu Multimedia Productions (Private) Limited, 2010.
Znajdź pełny tekst źródłaKatzenbeisser, Stefan, i Niklas Büscher. Compilation for Secure Multi-party Computation. Springer, 2017.
Znajdź pełny tekst źródłaShin, Hyun Bang, Murray Mckenzie i Do Young Oh, red. COVID-19 in Southeast Asia: Insights for a post-pandemic world. LSE Press, 2022. http://dx.doi.org/10.31389/lsepress.cov.
Pełny tekst źródłaCzęści książek na temat "Secure Compilation"
Namjoshi, Kedar S., i Lucas M. Tabajara. "Witnessing Secure Compilation". W Lecture Notes in Computer Science, 1–22. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39322-9_1.
Pełny tekst źródłaTsampas, Stelios, Andreas Nuyts, Dominique Devriese i Frank Piessens. "A Categorical Approach to Secure Compilation". W Coalgebraic Methods in Computer Science, 155–79. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-57201-3_9.
Pełny tekst źródłaBüscher, Niklas, i Stefan Katzenbeisser. "Towards Scalable and Optimizing Compilation for MPC". W Compilation for Secure Multi-party Computation, 79–85. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_7.
Pełny tekst źródłaBüscher, Niklas, i Stefan Katzenbeisser. "Introduction". W Compilation for Secure Multi-party Computation, 1–4. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_1.
Pełny tekst źródłaBüscher, Niklas, i Stefan Katzenbeisser. "Background". W Compilation for Secure Multi-party Computation, 5–13. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_2.
Pełny tekst źródłaBüscher, Niklas, i Stefan Katzenbeisser. "Compiling ANSI-C Code into Boolean Circuits". W Compilation for Secure Multi-party Computation, 15–28. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_3.
Pełny tekst źródłaBüscher, Niklas, i Stefan Katzenbeisser. "Compiling Size-Optimized Circuits for Constant-Round MPC Protocols". W Compilation for Secure Multi-party Computation, 29–42. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_4.
Pełny tekst źródłaBüscher, Niklas, i Stefan Katzenbeisser. "Compiling Parallel Circuits". W Compilation for Secure Multi-party Computation, 43–59. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_5.
Pełny tekst źródłaBüscher, Niklas, i Stefan Katzenbeisser. "Compiling Depth-Optimized Circuits for Multi-Round MPC Protocols". W Compilation for Secure Multi-party Computation, 61–77. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67522-0_6.
Pełny tekst źródłaAbate, Carmine, Roberto Blanco, Ștefan Ciobâcă, Adrien Durier, Deepak Garg, Cătălin Hrițcu, Marco Patrignani, Éric Tanter i Jérémy Thibault. "Trace-Relating Compiler Correctness and Secure Compilation". W Programming Languages and Systems, 1–28. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-44914-8_1.
Pełny tekst źródłaStreszczenia konferencji na temat "Secure Compilation"
Blazy, Sandrine. "From Verified Compilation to Secure Compilation: a Semantic Approach". W CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411506.3417601.
Pełny tekst źródłaAgten, Pieter, Raoul Strackx, Bart Jacobs i Frank Piessens. "Secure Compilation to Modern Processors". W 2012 IEEE 25th Computer Security Foundations Symposium (CSF). IEEE, 2012. http://dx.doi.org/10.1109/csf.2012.12.
Pełny tekst źródłaPatrignani, Marco, i Deepak Garg. "Secure Compilation and Hyperproperty Preservation". W 2017 IEEE 30th Computer Security Foundations Symposium (CSF). IEEE, 2017. http://dx.doi.org/10.1109/csf.2017.13.
Pełny tekst źródłaBarthe, Gilles, Sandrine Blazy, Remi Hutin i David Pichardie. "Secure Compilation of Constant-Resource Programs". W 2021 IEEE 34th Computer Security Foundations Symposium (CSF). IEEE, 2021. http://dx.doi.org/10.1109/csf51468.2021.00020.
Pełny tekst źródłaBaltopoulos, Ioannis G., i Andrew D. Gordon. "Secure compilation of a multi-tier web language". W the 4th international workshop. New York, New York, USA: ACM Press, 2008. http://dx.doi.org/10.1145/1481861.1481866.
Pełny tekst źródłaVu, Son Tuan, Karine Heydemann, Arnaud de Grandmaison i Albert Cohen. "Secure delivery of program properties through optimizing compilation". W CC '20: 29th International Conference on Compiler Construction. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3377555.3377897.
Pełny tekst źródłaRodriguez, Rafael, Derek Copold, Mark Milkovisch, Christopher Babin, Rafael Ramirez i Ibrahim Ugah. "Light Intervention Platform for 28,500-psi Environments". W SPE 2023 Symposium Compilation. SPE, 2023. http://dx.doi.org/10.2118/215185-ms.
Pełny tekst źródłaAbate, Carmine, Roberto Blanco, Deepak Garg, Catalin Hritcu, Marco Patrignani i Jeremy Thibault. "Journey Beyond Full Abstraction: Exploring Robust Property Preservation for Secure Compilation". W 2019 IEEE 32nd Computer Security Foundations Symposium (CSF). IEEE, 2019. http://dx.doi.org/10.1109/csf.2019.00025.
Pełny tekst źródłaBarthe, Gilles, Benjamin Gregoire i Vincent Laporte. "Secure Compilation of Side-Channel Countermeasures: The Case of Cryptographic “Constant-Time”". W 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00031.
Pełny tekst źródłaBruce, Thomas J., i Arild F. Stein. "A New Approach to Barrier Verification". W SPE 2021 Symposium Compilation. SPE, 2021. http://dx.doi.org/10.2118/205833-ms.
Pełny tekst źródłaRaporty organizacyjne na temat "Secure Compilation"
Hovorka, Susan. SECARB Finalize, Distribute and Archive Subsurface Data Compilation. Office of Scientific and Technical Information (OSTI), sierpień 2012. http://dx.doi.org/10.2172/1821444.
Pełny tekst źródła