43 papers:
MSR-2015-SinhaSDPM #detection #repository #source code- Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
ICFP-2015-Russo #functional #haskell- Functional pearl: two can keep a secret, if one of them uses Haskell (AR), pp. 280–288.
ESEC-FSE-2015-AcherBCBJ #product line- Product lines can jeopardize their trade secrets (MA, GB, BC, BB, JMJ), pp. 930–933.
ASPLOS-2015-DavidGT #concurrent #data type #scalability- Asynchronized Concurrency: The Secret to Scaling Concurrent Search Data Structures (TD, RG, VT), pp. 631–644.
ICALP-v2-2014-NikzadR #algorithm #approximate #multi #problem- Sending Secrets Swiftly: Approximation Algorithms for Generalized Multicast Problems (AN, RR), pp. 568–607.
KDIR-2014-KurasEAH #data mining #mining #security- The GDR Through the Eyes of the Stasi — Data Mining on the Secret Reports of the State Security Service of the former German Democratic Republic (CK, TE, CA, GH), pp. 360–365.
CHI-2013-ErikssonAS- The secret life of a persona: when the personal becomes private (EE, HA, AS), pp. 2677–2686.
WCRE-2012-BaysalKHG #case study- The Secret Life of Patches: A Firefox Case Study (OB, OK, RH, MWG), pp. 447–455.
WCRE-2011-ZhaoAH #automation- Automatic Extraction of Secrets from Malware (ZZ, GJA, HH), pp. 159–168.
VLDB-2010-BotanDDHMT #analysis #execution #named #semantics- SECRET: A Model for Analysis of the Execution Semantics of Stream Processing Systems (IB, RD, ND, LMH, RJM, NT), pp. 232–243.
KR-2010-KelveyMNS #dependence #functional #independence- Independence and Functional Dependence Relations on Secrets (RK, SMM, PN, BS).
ECOOP-2010-Ernst- Secret Valley (EE), p. 379.
SAC-2010-SorniottiM #facebook #implementation #network #social- Secret interest groups (SIGs) in social networks with an implementation on Facebook (AS, RM), pp. 621–628.
ESOP-2009-DemangeS- All Secrets Great and Small (DD, DS), pp. 207–221.
STOC-2009-DodisW #encryption #symmetry- Non-malleable extractors and symmetric key cryptography from weak secrets (YD, DW), pp. 601–610.
SAC-2009-BiagioniDPS #distributed- Practical distributed voter-verifiable secret ballot system (EB, YD, WP, KS), pp. 16–21.
ICSE-2009-ArandaV #debugging #fault #repository- The secret life of bugs: Going past the errors and omissions in software repositories (JA, GV), pp. 298–308.
DAC-2008-RoyKM #hardware- Protecting bus-based hardware IP by secret sharing (JAR, FK, ILM), pp. 846–851.
FM-2008-KiniryZ #formal method- Secret Ninja Formal Methods (JRK, DMZ), pp. 214–228.
ICPR-2008-OkaKXLW #authentication #named #similarity #sketching #using- Scribble-a-Secret: Similarity-based password authentication using sketches (MO, KK, YX, LL, FW), pp. 1–4.
DAC-2007-SuhD #authentication #generative #physics- Physical Unclonable Functions for Device Authentication and Secret Key Generation (GES, SD), pp. 9–14.
QAPL-2007-ChothiaPD #component- Keeping Secrets in Resource Aware Components (TC, JP, MTD), pp. 79–94.
ICALP-v2-2006-FouquePSZ- Hardness of Distinguishing the MSB or LSB of Secret Keys in Diffie-Hellman Schemes (PAF, DP, JS, SZ), pp. 240–251.
ICALP-v2-2006-TassaD #multi- Multipartite Secret Sharing by Bivariate Interpolation (TT, ND), pp. 288–299.
ICPR-v3-2006-HuangL #image #using- A Secret Image Sharing Method Using Integer-to-Integer Wavelet Transform (CPH, CCL), pp. 802–805.
DATE-DF-2004-FaroukS #architecture #design #implementation- Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA (HAF, MS), pp. 212–217.
SIGMOD-2004-FundulakiSLGOP- Share your data, Keep your secrets (IF, AS), pp. 945–946.
STOC-2004-HalpernT #multi- Rational secret sharing and multiparty computation: extended abstract (JYH, VT), pp. 623–632.
ICPR-v4-2004-YuWT #estimation #on the- On Estimation of Secret Message Length in JSteg-like Steganography (XY, YW, TT), pp. 673–676.
KDD-2004-DavidsonP #image- Locating secret messages in images (ID, GP), pp. 545–550.
UML-2003-Coad #agile #process- Agile Processes: Developing Your Own “Secret Recipes” (PC), p. 1.
DAC-2002-SchaumontKV #design- Unlocking the design secrets of a 2.29 Gb/s Rijndael processor (PS, HK, IV), pp. 634–639.
WRLA-2002-Rodriguez #maude #protocol- A Secret-Sharing Protocol Modelled in Maude (DER), pp. 223–239.
KDD-2002-DobraG #algorithm #linear #named #scalability- SECRET: a scalable linear regression tree algorithm (AD, JG), pp. 481–487.
STOC-2001-GennaroIKR #complexity #multi- The round complexity of verifiable secret sharing and secure multicast (RG, YI, EK, TR), pp. 580–589.
STOC-2000-CramerDD #complexity #multi #on the- On the complexity of verifiable secret sharing and multiparty computation (RC, ID, SD), pp. 325–334.
CIAA-2000-KlarlundMS #implementation- MONA Implementation Secrets (NK, AM, MIS), pp. 182–194.
POPL-2000-VolpanoS #verification- Verifying Secrets and Relative Secrecy (DMV, GS), pp. 268–276.
STOC-1994-BenalohT- Receipt-free secret-ballot elections (extended abstract) (JCB, DT), pp. 544–553.
STOC-1989-RabinB #multi #protocol- Verifiable Secret Sharing and Multiparty Protocols with Honest Majority (Extended Abstract) (TR, MBO), pp. 73–85.
ICLP-1987-MillerBTL87 #logic- Logical Secrets (MSM, DGB, EDT, JL), pp. 704–728.
STOC-1983-Blum #how- How to Exchange (Secret) Keys (Extended Abstract) (MB), pp. 440–447.
STOC-1982-GoldwasserM #encryption #game studies #how #probability- Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information (SG, SM), pp. 365–377.