Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization
暂无分享,去创建一个
Azer Bestavros | Andrei Lapets | Nikolaj Volgushev | Kinan Dak Albab | Rawane Issa | Azer Bestavros | Nikolaj Volgushev | A. Lapets | Rawane Issa
[1] Oded Goldreich,et al. The Foundations of Cryptography - Volume 2: Basic Applications , 2001 .
[2] Mayank Varia,et al. Secure multi-party computation for analytics deployed as a lightweight web application , 2016 .
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Azer Bestavros,et al. Programming Support for an Integrated Multi-Party Computation and MapReduce Infrastructure , 2015, 2015 Third IEEE Workshop on Hot Topics in Web Systems and Technologies (HotWeb).
[5] Avi Wigderson,et al. Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation (Extended Abstract) , 1988, STOC.
[6] Vitaly Shmatikov,et al. Privacy-Preserving Graph Algorithms in the Semi-honest Model , 2005, ASIACRYPT.
[7] J'anos Simon,et al. Proceedings of the twentieth annual ACM symposium on Theory of computing , 1988, STOC 1988.
[8] Xenofontas A. Dimitropoulos,et al. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics , 2010, USENIX Security Symposium.
[9] J. A.,et al. On Moore Graphs with Diameters 2 and 3 , 2022 .
[10] Stratis Ioannidis,et al. GraphSC: Parallel Secure Computation Made Easy , 2015, 2015 IEEE Symposium on Security and Privacy.
[11] Ryan Kastner,et al. Arithmetic Optimization Techniques for Hardware and Software Design: Fundamentals of digital arithmetic , 2010 .
[12] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System (Awarded Best Student Paper!) , 2004 .
[13] Michael Hicks,et al. Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations , 2014, 2014 IEEE Symposium on Security and Privacy.
[14] Azer Bestavros,et al. DEMO: Integrating MPC in Big Data Workflows , 2016, IACR Cryptol. ePrint Arch..
[15] Andrew Chi-Chih Yao,et al. Protocols for Secure Computations (Extended Abstract) , 1982, FOCS.
[16] Abhi Shelat,et al. Secure Computation from Millionaire , 2015, ASIACRYPT.
[17] Ivan Damgård,et al. Confidential Benchmarking Based on Multiparty Computation , 2016, Financial Cryptography.
[18] Bryan Parno,et al. Financial Cryptography and Data Security , 2011, Lecture Notes in Computer Science.
[19] Alfred V. Aho,et al. Compilers: Principles, Techniques, and Tools (2nd Edition) , 2006 .
[20] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[21] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[22] Joseph Bonneau,et al. What's in a Name? , 2020, Financial Cryptography.
[23] Kartik Nayak,et al. ObliVM: A Programming Framework for Secure Computation , 2015, 2015 IEEE Symposium on Security and Privacy.
[24] Marcel Keller,et al. An architecture for practical actively secure MPC with dishonest majority , 2013, IACR Cryptol. ePrint Arch..
[25] Benny Pinkas,et al. Fairplay - Secure Two-Party Computation System , 2004, USENIX Security Symposium.
[26] Benny Pinkas,et al. Maturity and Performance of Programmable Secure Computation , 2016, IEEE Security & Privacy.
[27] Oded Goldreich,et al. Foundations of Cryptography: Volume 2, Basic Applications , 2004 .
[28] Kevin M. Carter,et al. Probabilistic Threat Propagation for Network Security , 2014, IEEE Transactions on Information Forensics and Security.