ShadowCrypt: Encrypted Web Applications for Everyone
暂无分享,去创建一个
[1] Matthew Smith,et al. Confidentiality as a Service -- Usable Security for the Cloud , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[2] Helen J. Wang,et al. User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Dan Boneh,et al. Symmetric Cryptography in Javascript , 2009, 2009 Annual Computer Security Applications Conference.
[4] Andrew Chi-Chih Yao,et al. How to Generate and Exchange Secrets (Extended Abstract) , 1986, FOCS.
[5] Elaine Shi,et al. Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection , 2011, HotOS.
[6] A. Yao. How to generate and exchange secrets , 1986, 27th Annual Symposium on Foundations of Computer Science (sfcs 1986).
[7] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[8] Matt Welsh. Proceedings of the 13th USENIX conference on Hot topics in operating systems , 2011 .
[9] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[10] Brent Waters,et al. Functional Encryption: Definitions and Challenges , 2011, TCC.
[11] Jörg Schwenk,et al. Scriptless attacks: stealing the pie without touching the sill , 2012, CCS.
[12] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[13] Armando Solar-Lezama,et al. A language for automatically enforcing privacy policies , 2012, POPL '12.
[14] Mihai Christodorescu,et al. Private Use of Untrusted Web Servers via Opportunistic Encryption , 2008 .
[15] Adrian Perrig,et al. Bootstrapping Trust in Commodity Computers , 2010, 2010 IEEE Symposium on Security and Privacy.
[16] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.
[17] Brent Waters,et al. Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[18] Mihir Bellare,et al. Format-Preserving Encryption , 2009, IACR Cryptol. ePrint Arch..
[19] Helen J. Wang,et al. Clickjacking: Attacks and Defenses , 2012, USENIX Security Symposium.
[20] Naveen Agarwal,et al. Phishing Forbidden , 2007, ACM Queue.
[21] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[22] Rafail Ostrovsky,et al. How to Garble RAM Programs , 2013, EUROCRYPT.
[23] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[24] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.