Cryptographically Secure Computation
暂无分享,去创建一个
Robert K. Cunningham | Mayank Varia | Emily Shen | W. Konrad Vesey | R. Cunningham | Emily Shen | Mayank Varia | W. Vesey
[1] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[2] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[3] Dan Bogdanov. Sharemind: programmable secure computations with practical applications , 2013 .
[4] Michael Hicks,et al. Wysteria: A Programming Language for Generic, Mixed-Mode Multiparty Computations , 2014, 2014 IEEE Symposium on Security and Privacy.
[5] Robert K. Cunningham,et al. Automated Assessment of Secure Search Systems , 2015, OPSR.
[6] B. Obama. Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing , 2015 .