Secure computation protocols under asymmetric scenarios in enterprise information system
暂无分享,去创建一个
Xinchun Cui | Minghao Zhao | Yilei Wang | Yuemei Hu | Yijie Gao | Yilei Wang | M. Zhao | Xinchun Cui | Yuemei Hu | Yijie Gao
[1] Florian Kerschbaum. Building a privacy-preserving benchmarking enterprise system , 2008, Enterp. Inf. Syst..
[2] Abhi Shelat,et al. Collusion-Free Protocols in the Mediated Model , 2008, CRYPTO.
[3] A. K. Pal,et al. On the Fairness of Groce–Katz’s Protocol for Rational Players∗ , 2016 .
[4] Yehuda Lindell,et al. Utility Dependence in Correct and Fair Rational Secret Sharing , 2009, Journal of Cryptology.
[5] C. Pandu Rangan,et al. Rational Secret Sharing with Repeated Games , 2008, ISPEC.
[6] Ghizlane Orhanou,et al. Secure Mobile Multi Cloud Architecture for Authentication and Data Storage , 2017, Int. J. Cloud Appl. Comput..
[7] David C. Parkes,et al. Fairness with an Honest Minority and a Rational Majority , 2009, TCC.
[8] Zheng Wang,et al. Verification and validation in railway signalling engineering – an application of enterprise systems techniques , 2014, Enterp. Inf. Syst..
[9] Ran Canetti,et al. Toward a Game Theoretic View of Secure Computation , 2011, Journal of Cryptology.
[10] Yehuda Lindell,et al. Utility Dependence in Correct and Fair Rational Secret Sharing , 2009, CRYPTO.
[11] Keisuke Tanaka,et al. A Rational Secret-Sharing Scheme Based on RSA-OAEP , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[12] Latifa Ben Arfa Rabai,et al. A Security Framework for Secure Cloud Computing Environments , 2016, Int. J. Cloud Appl. Comput..
[13] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[14] Anna Lysyanskaya,et al. Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.
[15] Cai Yongquan,et al. A Verifiable Rational Secret Sharing Scheme Based on Bilinear Pairing , 2012 .
[16] C. Pandu Rangan,et al. Rational Secret Sharing with Honest Players over an Asynchronous Channel , 2011, IACR Cryptol. ePrint Arch..
[17] C. Pandu Rangan,et al. The deterministic protocol for rational secret sharing , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[18] Feng Jiang,et al. Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.
[19] Ueli Maurer,et al. Collusion-Preserving Computation , 2012, IACR Cryptol. ePrint Arch..
[20] Sergei Izmalkov,et al. Verifiably Secure Devices , 2008, TCC.
[21] Abhi Shelat,et al. Completely fair SFE and coalition-safe cheap talk , 2004, PODC '04.
[22] Keisuke Tanaka,et al. A Game-Theoretic Perspective on Oblivious Transfer , 2012, ACISP.
[23] Abhi Shelat,et al. Purely Rational Secret Sharing (Extended Abstract) , 2009, TCC.
[24] Peng Zhang,et al. e-DMDAV: A new privacy preserving algorithm for wearable enterprise information systems , 2018, Enterp. Inf. Syst..
[25] Ran Canetti,et al. Universally Composable Security with Local Adversaries , 2012, SCN.
[26] Xi Chen,et al. One-time rational secret sharing scheme based on bayesian game , 2011, Wuhan University Journal of Natural Sciences.
[27] Zhifang Zhang,et al. Rational secret sharing as extensive games , 2013, Science China Information Sciences.
[28] Xiaoyu,et al. Rational Secret Sharing Protocol with Fairness , 2012 .
[29] Abhi Shelat,et al. Collusion-Free Multiparty Computation in the Mediated Model , 2009, CRYPTO.
[30] Chunhui Li,et al. Principal whitened gradient-projection algorithm for distribution control , 2013, Science China Information Sciences.
[31] Brij B. Gupta,et al. A novel approach to defend multimedia flash crowd in cloud environment , 2017, Multimedia Tools and Applications.
[32] Ueli Maurer,et al. Rational Protocol Design: Cryptography against Incentive-Driven Adversaries , 2013, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science.
[33] Cai,et al. A New Rational Secret Sharing Scheme , 2010 .
[34] Jonathan Katz,et al. Fair Computation with Rational Players , 2012, EUROCRYPT.
[35] Alon Rosen,et al. Sequential Rationality in Cryptographic Protocols , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[36] Yehuda Lindell,et al. Complete Fairness in Secure Two-Party Computation , 2011, JACM.
[37] XU Qiu-liang. New rational secret sharing , 2009 .
[38] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[39] Arpita Maitra,et al. Fairness in Secure Two-Party Computation with Rational Players , 2015, IACR Cryptol. ePrint Arch..
[40] Brij B. Gupta,et al. Network flow analysis for detection and mitigation of Fraudulent Resource Consumption (FRC) attacks in multimedia cloud computing , 2017, Multimedia Tools and Applications.
[41] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[42] Georg Fuchsbauer,et al. Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..
[43] Dharma P. Agrawal,et al. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .
[44] Tianqing Zhu,et al. Reward-based spatial crowdsourcing with differential privacy preservation , 2017, Enterp. Inf. Syst..
[45] Duncan S. Wong,et al. Fair two-party computation with rational parties holding private types , 2015, Secur. Commun. Networks.
[46] Brij B. Gupta,et al. Survey on DDoS Attacks and Defense Mechanisms in Cloud and Fog Computing , 2018, Int. J. E Serv. Mob. Appl..
[47] Jonathan Katz,et al. Rational Secret Sharing, Revisited , 2006, SCN.
[48] Tao Li,et al. A brief survey on secure multi-party computing in the presence of rational parties , 2015, J. Ambient Intell. Humaniz. Comput..
[49] Jonathan Katz,et al. Partial Fairness in Secure Two-Party Computation , 2010, Journal of Cryptology.
[50] A. K. Pal,et al. Revisiting Secure Two-Party Computation with Rational Players , 2016 .
[51] Sergei Izmalkov,et al. Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[52] Yi Yang,et al. Rational Multi-Secret Sharing Scheme Based On Bit Commitment Protocol , 2012, J. Networks.
[53] Ruchika Asija,et al. Healthcare SaaS Based on a Data Model with Built-In Security and Privacy , 2016, Int. J. Cloud Appl. Comput..
[54] Abhi Shelat,et al. Collusion-free protocols , 2005, STOC '05.