3,728 research outputs found

    Space-Aware Ambients and Processes

    No full text
    Resource control has attracted increasing interest in foundational research on distributed systems. This paper focuses on space control and develops an analysis of space usage in the context of an ambient-like calculus with bounded capacities and weighed processes, where migration and activation require space. A type system complements the dynamics of the calculus by providing static guarantees that the intended capacity bounds are preserved throughout the computation

    Simple Noninterference from Parametricity

    Get PDF
    In this paper we revisit the connection between parametricity and noninterference. Our primary contribution is a proof of noninterference for a polyvariant variation of the Dependency Core Calculus of in the Calculus of Constructions. The proof is modular: it leverages parametricity for the Calculus of Constructions and the encoding of data abstraction using existential types. This perspective gives rise to simple and understandable proofs of noninterference from parametricity. All our contributions have been mechanised in the Agda proof assistant

    Steganography- A Powerful Web Security Tool for Data Transmission

    Get PDF
    The main objective of this paper titled ďż˝ Steganography ďż˝ A secured tool for web data transmissionďż˝ is to provide security for data files during transmission in the network. The main motto of this type of data security is to prevent data access by unauthorized users during data transmission. The steganography is the process to convert the transmitting data in the network in an unreadable format and it is difficult to understand the stolen person

    Advanced Steganography for Hiding Data and Image using Audio-Video

    Get PDF
    Steganography is an art of hiding the secrete message that is being send in the other non secret text. The benefit of steganography is that the expected mystery message does not pull in thoughtfulness regarding itself as an object of investigation. Our point is to conceal mystery data and picture behind the sound and feature document individually with. Sound records are generally compacted for capacity or speedier transmission. Sound records can be sent in short remain solitary portions. 4LSB is used for video steganography and cryptographic algorithm for encryption and decryption. Parity coding is used for Audio Steganography

    The Racket Manifesto

    Get PDF
    The creation of a programming language calls for guiding principles that point the developers to goals. This article spells out the three basic principles behind the 20-year development of Racket. First, programming is about stating and solving problems, and this activity normally takes place in a context with its own language of discourse; good programmers ought to formulate this language as a programming language. Hence, Racket is a programming language for creating new programming languages. Second, by following this language-oriented approach to programming, systems become multi-lingual collections of interconnected components. Each language and component must be able to protect its specific invariants. In support, Racket offers protection mechanisms to implement a full language spectrum, from C-level bit manipulation to soundly typed extensions. Third, because Racket considers programming as problem solving in the correct language, Racket also turns extra-linguistic mechanisms into linguistic constructs, especially mechanisms for managing resources and projects. The paper explains these principles and how Racket lives up to them, presents the evaluation framework behind the design process, and concludes with a sketch of Racket\u27s imperfections and opportunities for future improvements

    Primer: Fast Private Transformer Inference on Encrypted Data

    Full text link
    It is increasingly important to enable privacy-preserving inference for cloud services based on Transformers. Post-quantum cryptographic techniques, e.g., fully homomorphic encryption (FHE), and multi-party computation (MPC), are popular methods to support private Transformer inference. However, existing works still suffer from prohibitively computational and communicational overhead. In this work, we present, Primer, to enable a fast and accurate Transformer over encrypted data for natural language processing tasks. In particular, Primer is constructed by a hybrid cryptographic protocol optimized for attention-based Transformer models, as well as techniques including computation merge and tokens-first ciphertext packing. Comprehensive experiments on encrypted language modeling show that Primer achieves state-of-the-art accuracy and reduces the inference latency by 90.6% ~ 97.5% over previous methods.Comment: 6 pages, 6 figures, 3 table
    • …
    corecore