![]() CLAMP: Practical Prevention of Large-Scale Data Leaks. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. SCiFI - A System for Secure Face Identification. In IEEE Computer Security Foundations Symposium(CSF), 2012. Information-flow Control for Programming on Encrypted data. Flicker: An Execution Infrastructure for TCB Minimization. TrustVisor: Efficient TCB Reduction and Attestation. Fairplay - A Secure Two-Party Computation System. In IEEE Transactions on Image Processing, 2005. Fingerprinting Protocol for Images Based on Additive Homomorphic Property. In IEEE Computer Security Foundations Symposium, 2009. A Provably Secure And Efficient Countermeasure Against Timing Attacks. Making Linux Protection Mechanisms Egalitarian with UserFS. Faster Secure Two-Party Computation Using Garbled Circuits. TASTY: Tool for Automating Secure Two-partY computations. Flow-sensitive Pointer Analysis for Millions of Lines of Code. Implementing gentry0s fully-homomorphic encryption scheme. A Working Implementation of Fully Homomorphic Encryption. In 41st Annual ACM Symposium on Theory of Computing, 2009. Fully Homomorphic Encryption Using Ideal Lattices. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Information-flow Types for Homomorphic Encryptions. In Cryptology ePrint Archive, Report 2012/266. Compilation Techniques for Efficient Encrypted Computation. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. A Lattice Model of Secure Information Flow. Asynchronous Multiparty Computation: Theory and Implementation. In Electronic Colloquium on Computational Complexity, 2011. Fully Homomorphic Encryption without Bootstrapping. Targeted Malleability: Homomorphic Encryption for Restricted Computations. Public Key Encryption with Keyword Search. Encrypted Domain DCT Based on Homomorphic Cryptosystems. FairplayMP: A System for Secure Multi-party Computation. Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. Standards for the protection of personal information of residents of the commonwealth. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |