Practical Accountability of Secret Processes
暂无分享,去创建一个
Shafi Goldwasser | Daniel J. Weitzner | Sunoo Park | Jonathan Frankle | Daniel Shaar | S. Goldwasser | Jonathan Frankle | D. Weitzner | Sunoo Park | Daniel Shaar
[1] Jonathan Katz,et al. Global-Scale Secure Multiparty Computation , 2017, CCS.
[2] Yehuda Lindell,et al. Optimized Honest-Majority MPC for Malicious Adversaries — Breaking the 1 Billion-Gate Per Second Barrier , 2017, 2017 IEEE Symposium on Security and Privacy (SP).
[3] Joan Feigenbaum,et al. Open vs. closed systems for accountability , 2014, HotSoS '14.
[4] Siani Pearson,et al. Toward Accountability in the Cloud , 2011, IEEE Internet Computing.
[5] Joan Feigenbaum,et al. Catching Bandits and Only Bandits: Privacy-Preserving Intersection Warrants for Lawful Surveillance , 2014, FOCI.
[6] Geoff Holmes,et al. Security and Data Accountability in Distributed Systems: A Provenance Survey , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[7] Marcel Keller,et al. Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits , 2013, ESORICS.
[8] Joshua A. Kroll. Secure protocols for accountable warrant execution , 2014 .
[9] Micah Sherr,et al. Accountable wiretapping - or - I know they can hear you now , 2012, J. Comput. Secur..
[10] Eli Ben-Sasson,et al. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture , 2014, USENIX Security Symposium.
[11] Joan Feigenbaum,et al. Privacy-Preserving Lawful Contact Chaining: [Preliminary Report] , 2016, WPES@CCS.
[12] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[13] Daisuke Mashima,et al. Enabling Robust Information Accountability in E-healthcare Systems , 2012, HealthSec.
[14] Stephen W Smith,et al. Gagged, Sealed & Delivered: Reforming ECPA's Secret Docket , 2012 .
[15] Azer Bestavros,et al. Secure MPC for Analytics as a Web Application , 2016, 2016 IEEE Cybersecurity Development (SecDev).
[16] Butler W. Lampson. Privacy and securityUsable security , 2009, Commun. ACM.
[17] Yang Xiao,et al. A survey of accountability in computer networks and distributed systems , 2016, Secur. Commun. Networks.
[18] Yehuda Lindell,et al. Introduction to Modern Cryptography , 2004 .
[19] Stephen W Smith,et al. Kudzu in the Courthouse: Judgments Made in the Shade , 2009 .
[20] Eli Ben-Sasson,et al. Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs , 2015, 2015 IEEE Symposium on Security and Privacy.
[21] Claudio Orlandi,et al. A Framework for Outsourcing of Secure Computation , 2014, CCSW.
[22] Eli Ben-Sasson,et al. Scalable Zero Knowledge Via Cycles of Elliptic Curves , 2014, Algorithmica.
[23] Shahrukh Khan,et al. Ensuring Distributed Accountability for Data Sharing On the Cloud , 2016 .
[24] Seny Kamara. Restructuring the NSA Metadata Program , 2014, Financial Cryptography Workshops.
[25] Shafi Goldwasser,et al. Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal , 2017, WPES@CCS.
[26] Rebecca N. Wright,et al. Systematizing “ Accountability ” in Computer Science , 2012 .
[27] Yuval Ishai,et al. Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator , 2005, CRYPTO.
[28] V. T. Kamble,et al. Ensuring Distributed Accountability for Data Sharing in the Cloud , 2014 .
[29] Azer Bestavros,et al. User-centric distributed solutions for privacy-preserving analytics , 2017, Commun. ACM.