Faerieplay on Tiny Trusted Third Parties ( Work in Progress ) ∗
暂无分享,去创建一个
[1] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[2] Bennet S. Yee,et al. Using Secure Coprocessors , 1994 .
[3] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[4] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[5] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[6] Sean W. Smith,et al. Improving DES Coprocessor Throughput for Short Operations , 2001, USENIX Security Symposium.
[7] Sean W. Smith,et al. Practical server privacy with secure coprocessors , 2001, IBM Syst. J..
[8] Sean W. Smith,et al. Fairy Dust, Secrets, and the Real World , 2003, IEEE Secur. Priv..
[9] Leendert van Doorn,et al. The IBM PCIXCC: A new cryptographic coprocessor for the IBM eServer , 2004, IBM J. Res. Dev..
[10] John Viega,et al. The Security and Performance of the Galois/Counter Mode (GCM) of Operation , 2004, INDOCRYPT.
[11] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[12] Dmitri Asonov. Querying Databases Privately: A New Approach to Private Information Retrieval , 2004, Lecture Notes in Computer Science.
[13] Sean W. Smith,et al. Private Information Storage with Logarithm-Space Secure Hardware , 2004, International Information Security Workshops.
[14] Sean W. Smith. Outbound authentication for programmable secure coprocessors , 2004, International Journal of Information Security.
[15] Sean W. Smith,et al. More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties , 2005 .
[16] Sean W. Smith,et al. Protecting client privacy with trusted computing at the server , 2005, IEEE Security & Privacy Magazine.
[17] Sean W. Smith,et al. Towards Tiny Trusted Third Parties , 2005 .
[18] G. Edward Suh,et al. Design and implementation of the AEGIS single-chip secure processor using physical random functions , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[19] A. Iliev. Using Tiny Trusted Third Parties to Enhance Secure Two-Party Computations , 2006 .
[20] Robert H. Deng,et al. Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..
[21] A Formal Treatment of Remotely KeyedEncryption ( Extended Abstract ) ? , 2007 .