43 papers:
- MSR-2015-SinhaSDPM #detection #repository #source code
- Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
- ICFP-2015-Russo #functional #haskell
- Functional pearl: two can keep a secret, if one of them uses Haskell (AR), pp. 280–288.
- ESEC-FSE-2015-AcherBCBJ #product line
- Product lines can jeopardize their trade secrets (MA, GB, BC, BB, JMJ), pp. 930–933.
- ASPLOS-2015-DavidGT #concurrent #data type #scalability
- Asynchronized Concurrency: The Secret to Scaling Concurrent Search Data Structures (TD, RG, VT), pp. 631–644.
- ICALP-v2-2014-NikzadR #algorithm #approximate #multi #problem
- Sending Secrets Swiftly: Approximation Algorithms for Generalized Multicast Problems (AN, RR), pp. 568–607.
- KDIR-2014-KurasEAH #data mining #mining #security
- The GDR Through the Eyes of the Stasi — Data Mining on the Secret Reports of the State Security Service of the former German Democratic Republic (CK, TE, CA, GH), pp. 360–365.
- CHI-2013-ErikssonAS
- The secret life of a persona: when the personal becomes private (EE, HA, AS), pp. 2677–2686.
- WCRE-2012-BaysalKHG #case study
- The Secret Life of Patches: A Firefox Case Study (OB, OK, RH, MWG), pp. 447–455.
- WCRE-2011-ZhaoAH #automation
- Automatic Extraction of Secrets from Malware (ZZ, GJA, HH), pp. 159–168.
- VLDB-2010-BotanDDHMT #analysis #execution #named #semantics
- SECRET: A Model for Analysis of the Execution Semantics of Stream Processing Systems (IB, RD, ND, LMH, RJM, NT), pp. 232–243.
- KR-2010-KelveyMNS #dependence #functional #independence
- Independence and Functional Dependence Relations on Secrets (RK, SMM, PN, BS).
- ECOOP-2010-Ernst
- Secret Valley (EE), p. 379.
- SAC-2010-SorniottiM #facebook #implementation #network #social
- Secret interest groups (SIGs) in social networks with an implementation on Facebook (AS, RM), pp. 621–628.
- ESOP-2009-DemangeS
- All Secrets Great and Small (DD, DS), pp. 207–221.
- STOC-2009-DodisW #encryption #symmetry
- Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
- SAC-2009-BiagioniDPS #distributed
- Practical distributed voter-verifiable secret ballot system (EB, YD, WP, KS), pp. 16–21.
- ICSE-2009-ArandaV #debugging #fault #repository
- The secret life of bugs: Going past the errors and omissions in software repositories (JA, GV), pp. 298–308.
- DAC-2008-RoyKM #hardware
- Protecting bus-based hardware IP by secret sharing (JAR, FK, ILM), pp. 846–851.
- FM-2008-KiniryZ #formal method
- Secret Ninja Formal Methods (JRK, DMZ), pp. 214–228.
- ICPR-2008-OkaKXLW #authentication #named #similarity #sketching #using
- Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
- DAC-2007-SuhD #authentication #generative #physics
- Physical Unclonable Functions for Device Authentication and Secret Key Generation (GES, SD), pp. 9–14.
- QAPL-2007-ChothiaPD #component
- Keeping Secrets in Resource Aware Components (TC, JP, MTD), pp. 79–94.
- ICALP-v2-2006-FouquePSZ
- Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes (PAF, DP, JS, SZ), pp. 240–251.
- ICALP-v2-2006-TassaD #multi
- Multipartite Secret Sharing by Bivariate Interpolation (TT, ND), pp. 288–299.
- ICPR-v3-2006-HuangL #image #using
- A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
- DATE-DF-2004-FaroukS #architecture #design #implementation
- Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA (HAF, MS), pp. 212–217.
- SIGMOD-2004-FundulakiSLGOP
- Share your data, Keep your secrets (IF, AS), pp. 945–946.
- STOC-2004-HalpernT #multi
- Rational secret sharing and multiparty computation: extended abstract (JYH, VT), pp. 623–632.
- ICPR-v4-2004-YuWT #estimation #on the
- On Estimation of Secret Message Length in JSteg-like Steganography (XY, YW, TT), pp. 673–676.
- KDD-2004-DavidsonP #image
- Locating secret messages in images (ID, GP), pp. 545–550.
- UML-2003-Coad #agile #process
- Agile Processes: Developing Your Own “Secret Recipes” (PC), p. 1.
- DAC-2002-SchaumontKV #design
- Unlocking the design secrets of a 2.29 Gb/s Rijndael processor (PS, HK, IV), pp. 634–639.
- WRLA-2002-Rodriguez #maude #protocol
- A Secret-Sharing Protocol Modelled in Maude (DER), pp. 223–239.
- KDD-2002-DobraG #algorithm #linear #named #scalability
- SECRET: a scalable linear regression tree algorithm (AD, JG), pp. 481–487.
- STOC-2001-GennaroIKR #complexity #multi
- The round complexity of verifiable secret sharing and secure multicast (RG, YI, EK, TR), pp. 580–589.
- STOC-2000-CramerDD #complexity #multi #on the
- On the complexity of verifiable secret sharing and multiparty computation (RC, ID, SD), pp. 325–334.
- CIAA-2000-KlarlundMS #implementation
- MONA Implementation Secrets (NK, AM, MIS), pp. 182–194.
- POPL-2000-VolpanoS #verification
- Verifying Secrets and Relative Secrecy (DMV, GS), pp. 268–276.
- STOC-1994-BenalohT
- Receipt-free secret-ballot elections (extended abstract) (JCB, DT), pp. 544–553.
- STOC-1989-RabinB #multi #protocol
- Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract) (TR, MBO), pp. 73–85.
- ICLP-1987-MillerBTL87 #logic
- Logical Secrets (MSM, DGB, EDT, JL), pp. 704–728.
- STOC-1983-Blum #how
- How to Exchange (Secret) Keys (Extended Abstract) (MB), pp. 440–447.
- STOC-1982-GoldwasserM #encryption #game studies #how #probability
- Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information (SG, SM), pp. 365–377.