Sharemind: A Framework for Fast Privacy-Preserving Computations (English)
Free access
- New search for: Bogdanov, Dan
- New search for: Laur, Sven
- New search for: Willemson, Jan
- New search for: Bogdanov, Dan
- New search for: Laur, Sven
- New search for: Willemson, Jan
In:
Computer Security - ESORICS 2008
5
;
192-206
;
2008
- Article/Chapter (Book) / Electronic Resource
-
Title:Sharemind: A Framework for Fast Privacy-Preserving Computations
-
Contributors:
-
Published in:Computer Security - ESORICS 2008 , 5 ; 192-206Lecture Notes in Computer Science ; 5283, 5 ; 192-206
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2008-01-01
-
Size:15 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Multiprimary Support for the Availability of Cluster-Based Stateful Firewalls Using FT-FWNeira, P. / Gasca, R. M. / Lefèvre, L. et al. | 2008
- 18
-
Identifying Critical Attack Assets in Dependency Attack GraphsSawilla, Reginald E. / Ou, Xinming et al. | 2008
- 35
-
Online Risk Assessment of Intrusion Scenarios Using D-S Evidence TheoryMu, C. P. / Li, X. J. / Huang, H. K. / Tian, S. F. et al. | 2008
- 49
-
Strongly-Resilient and Non-interactive Hierarchical Key-Agreement in MANETsGennaro, Rosario / Halevi, Shai / Krawczyk, Hugo / Rabin, Tal / Reidt, Steffen / Wolthusen, Stephen D. et al. | 2008
- 66
-
Efficient Handling of Adversary Attacks in Aggregation ApplicationsTaban, Gelareh / Gligor, Virgil D. et al. | 2008
- 82
-
Symmetric Key Approaches to Securing BGP – A Little Bit Trust Is EnoughBruhadeshwar, Bezawada / Kulkarni, Sandeep S. / Liu, Alex X. et al. | 2008
- 97
-
Dismantling MIFARE ClassicGarcia, Flavio D. / Koning Gans, Gerhard / Muijrers, Ruben / Rossum, Peter / Verdult, Roel / Schreur, Ronny Wichers / Jacobs, Bart et al. | 2008
- 115
-
A Browser-Based Kerberos Authentication SchemeGajek, Sebastian / Jager, Tibor / Manulis, Mark / Schwenk, Jörg et al. | 2008
- 130
-
CROO: A Universal Infrastructure and Protocol to Detect Identity FraudNali, D. / Oorschot, P. C. et al. | 2008
- 146
-
Disclosure Analysis and Control in Statistical DatabasesLi, Yingjiu / Lu, Haibing et al. | 2008
- 161
-
TRACE: Zero-Down-Time Database Damage Tracking, Quarantine, and Cleansing with Negligible Run-Time OverheadBai, Kun / Yu, Meng / Liu, Peng et al. | 2008
- 177
-
Access Control Friendly Query Verification for Outsourced Data PublishingChen, Hong / Ma, Xiaonan / Hsu, Windsor / Li, Ninghui / Wang, Qihua et al. | 2008
- 192
-
Sharemind: A Framework for Fast Privacy-Preserving ComputationsBogdanov, Dan / Laur, Sven / Willemson, Jan et al. | 2008
- 207
-
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT FirmsYannacopoulos, Athanassios N. / Lambrinoudakis, Costas / Gritzalis, Stefanos / Xanthopoulos, Stylianos Z. / Katsikas, Sokratis N. et al. | 2008
- 223
-
Remote Integrity Check with Dishonest Storage ServerChang, Ee-Chien / Xu, Jia et al. | 2008
- 238
-
A Low-Variance Random-Walk Procedure to Provide Anonymity in Overlay NetworksMuñoz-Gea, J. P. / Malgosa-Sanahuja, J. / Manzanares-Lopez, P. / Sanchez-Aarnoutse, J. C. / Garcia-Haro, J. et al. | 2008
- 251
-
RFID Privacy Models RevisitedNg, Ching Yu / Susilo, Willy / Mu, Yi / Safavi-Naini, Rei et al. | 2008
- 267
-
A New Formal Proof Model for RFID Location PrivacyHa, JungHoon / Moon, SangJae / Zhou, Jianying / Ha, JaeCheol et al. | 2008
- 282
-
Distributed Authorization by Multiparty Trust NegotiationZhang, Charles C. / Winslett, Marianne et al. | 2008
- 300
-
Compositional Refinement of Policies in UML – Exemplified for Access ControlSolhaug, Bjørnar / Stølen, Ketil et al. | 2008
- 317
-
On the Security of Delegation in Access Control SystemsWang, Qihua / Li, Ninghui / Chen, Hong et al. | 2008
- 333
-
Termination-Insensitive Noninterference Leaks More Than Just a BitAskarov, Aslan / Hunt, Sebastian / Sabelfeld, Andrei / Sands, David et al. | 2008
- 349
-
Security Provisioning in Pervasive Environments Using Multi-objective OptimizationDewri, Rinku / Ray, Indrakshi / Ray, Indrajit / Whitley, Darrell et al. | 2008
- 364
-
Improved Security Notions and Protocols for Non-transferable IdentificationBlundo, Carlo / Persiano, Giuseppe / Sadeghi, Ahmad-Reza / Visconti, Ivan et al. | 2008
- 379
-
Human Readable Paper Verification of Prêt à VoterLundin, David / Ryan, Peter Y. A. et al. | 2008
- 396
-
A Distributed Implementation of the Certified Information Access ServiceBlundo, Carlo / Cristofaro, Emiliano / Sorbo, Aniello / Galdi, Clemente / Persiano, Giuseppe et al. | 2008
- 411
-
Exploring User Reactions to New Browser Cues for Extended Validation CertificatesSobey, Jennifer / Biddle, Robert / Oorschot, P. C. / Patrick, Andrew S. et al. | 2008
- 428
-
A Framework for the Analysis of Mix-Based Steganographic File SystemsDiaz, Claudia / Troncoso, Carmela / Preneel, Bart et al. | 2008
- 446
-
An Adaptive Policy-Based Approach to SPIT ManagementSoupionis, Yannis / Dritsas, Stelios / Gritzalis, Dimitris et al. | 2008
- 461
-
Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures?Davis, Carlton R. / Neville, Stephen / Fernandez, José M. / Robert, Jean-Marc / McHugh, John et al. | 2008
- 481
-
Eureka: A Framework for Enabling Static Malware AnalysisSharif, Monirul / Yegneswaran, Vinod / Saidi, Hassen / Porras, Phillip / Lee, Wenke et al. | 2008
- 501
-
New Considerations about the Correct Design of Turbo Fingerprinting CodesTomàs-Buliart, Joan / Fernández, Marcel / Soriano, Miguel et al. | 2008
- 517
-
Formally Bounding the Side-Channel Leakage in Unknown-Message AttacksBackes, Michael / Köpf, Boris et al. | 2008
- 533
-
Cryptographic Protocol Explication and End-Point ProjectionMcCarthy, Jay / Krishnamurthi, Shriram et al. | 2008
- 548
-
State Space Reduction in the Maude-NRL Protocol AnalyzerEscobar, Santiago / Meadows, Catherine / Meseguer, José et al. | 2008
- 563
-
Code-Carrying AuthorizationMaffeis, Sergio / Abadi, Martín / Fournet, Cédric / Gordon, Andrew D. et al. | 2008
- 580
-
CPU Bugs, CPU Backdoors and Consequences on SecurityDuflot, Loïc et al. | 2008