

Maintained by: Graphical password applet for entering SSH passphrase Maintained by: Two-factor authentication on the command line Long description | Changes | Main Web Site 0d1n-2.3 Open source web HTTP fuzzing tool and bruteforcer IBM Press, 13-23.Programme zur Erhaltung/Verbesserung der Systemsicherheit. In Proceedings of the 1999 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON '99). Soot - a Java Bytecode Optimization Framework. In Proceedings of the 39th international conference on Very Large Data Bases (VLDB'13). Processing analytical queries over encrypted data. Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. AUTOCRYPT: Enabling Homomorphic Computation on Servers to Protect Sensitive Web Content. MrCrypt: Static Analysis for Secure Cloud Computations.

In Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (SOSP '11). CryptDB: Protecting Confidentiality with Encrypted Query Processing. In Proceedings of the 2009 ACMSIGMOD International Conference on Management of Data (SIGMOD '09). A Comparison of Approaches to Large-scale Data Analysis.

In Proceedings of the 17th International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT'99). Public-key Cryptosystems Based on Composite Degree Residuosity Classes. In Proceedings of the 2Nd ACM SIGPLAN International Workshop on State Of the Art in Java Program Analysis (SOAP '13). Interprocedural Data Flow Analysis in Soot Using Value Contexts. Springer Publishing Company, Incorporated. IEEE Transactions on Parallel and Distributed Systems 7, 7 (Jul 1996), 689-704. A unified framework for optimizing communication in data-parallel programs. Springer Berlin Heidelberg, Berlin, Heidelberg, 266-282. A unified data-flow framework for optimizing communication. Manish Gupta, Edith Schonberg, and Harini Srinivasan.of Cryptographic Techn.: Advances in Cryptology (EUROCRYPT'11). Implementing Gentry's Fully-homomorphic Encryption Scheme. Computing Arbitrary Functions of Encrypted Data. In Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing (STOC '09). Fully Homomorphic Encryption Using Ideal Lattices. Java Platform: Virtual Machines, Lang., and Tools (PPPJ '16). JCrypt: Towards Computation over Encrypted Data. Yao Dong, Ana Milanova, and Julian Dolby.Introduction to Algorithms, Third Edition (3rd ed.). IBM touts encryption innovation: New technology performs calculations on encrypted data without decrypting it. In Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles (SOSP '07). Secure Web Applications via Automatic Partitioning. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA. Compilers: Principles, Techniques, and Tools (2Nd Edition). Faraz Ahmad, Seyong Lee, Mithuna Thottethodi, and T.N.
