Decentralized and Privacy-Preserving Key Management Model
暂无分享,去创建一个
[1] Fabrizio d'Amore,et al. Authentication as a service: Shamir Secret Sharing with byzantine components , 2018, ArXiv.
[2] Yehuda Lindell,et al. Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..
[3] V. P. Binu,et al. An effective private data storage and retrieval system using secret sharing scheme based on secure multi-party computation , 2014, 2014 International Conference on Data Science & Engineering (ICDSE).
[4] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[7] N. Asokan,et al. Trusted execution environments on mobile devices , 2013, CCS.
[8] Jean Everson Martina,et al. Audit and backup procedures for hardware security modules , 2008, IDtrust '08.
[9] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[10] Jim Groom,et al. The Path to Self-Sovereign Identity , 2017 .
[11] Félix Gómez Mármol,et al. TRIMS, a privacy-aware trust and reputation model for identity management systems , 2010, Comput. Networks.
[12] Durgesh Kumar Mishra,et al. Privacy Preserving k Secure Sum Protocol , 2009, ArXiv.
[13] First A. Neha Pathak,et al. An efficient method for privacy preserving data mining in secure multiparty computation , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).
[14] Liu Dan,et al. A key escrow scheme to IOT based on Shamir , 2013, 2013 International Conference on Communications, Circuits and Systems (ICCCAS).
[15] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[16] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[17] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[18] Moti Yung,et al. How to share a function securely , 1994, STOC '94.
[19] Chris Clifton,et al. Tools for privacy preserving distributed data mining , 2002, SKDD.
[20] Wenzhe Sun,et al. A Proposal of Key Recovery Mechanism for Personal Decryptographic Keys , 2011, 2011 International Conference on Internet Technology and Applications.
[21] Chris J. Mitchell,et al. Matching key recovery mechanisms to business requirements , 2005, Comput. Secur..