Author:
Carter Henry,Mood Benjamin,Traynor Patrick,Butler Kevin
Publisher
Springer International Publishing
Reference21 articles.
1. Beaver, D.: Server-assisted cryptography. In: Proceedings of the workshop on New security paradigms (NSPW) (1998)
2. Carter, H., Amrutkar, C., Dacosta, I., Traynor, P.: For your phone only: custom protocols for efficient secure function evaluation on mobile devices. J. Secur. Commun. Netw. (SCN) 7(7), 1165–1176 (2014)
3. Carter, H., Lever, C., Traynor, P.: Whitewash: outsourcing garbled circuit generation for mobile devices. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC) (2014)
4. Carter, H., Mood, B., Traynor, P., Butler, K.: Secure outsourced garbled circuit evaluation for mobile devices. In: Proceedings of the USENIX Security Symposium (2013)
5. Carter, H., Mood, B., Traynor, P., Butler, K.: Outsourcing secure two-party computation as a black box. Cryptology ePrint Archive, Report 2014/936 (2014).
http://eprint.iacr.org/
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Attesting Distributional Properties of Training Data for Machine Learning;Lecture Notes in Computer Science;2024
2. Privado;ACM Transactions on Privacy and Security;2020-08-31
3. A Hybrid Approach to Secure Function Evaluation using SGX;Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security;2019-07-02
4. Secure Data Exchange;Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop - CCSW'19;2019
5. TaaS;Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop - CCSW'19;2019