메뉴 건너뛰기




Volumn , Issue , 2010, Pages 954-959

Policy-agile encrypted networks via secure function computation

Author keywords

Black core; Content oriented internetworking; Content context awareness; Policy agility; Secure multiparty computation

Indexed keywords

BLACK CORES; CONTENT/CONTEXT-AWARENESS; INTERNETWORKING; POLICY-AGILITY; SECURE MULTI-PARTY COMPUTATION;

EID: 79951660868     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2010.5679583     Document Type: Conference Paper
Times cited : (3)

References (27)
  • 11
    • 36749033301 scopus 로고    scopus 로고
    • Private Searching on Streaming Data
    • Oct
    • Rafail Ostrovsky, William E. Skeith, III, "Private Searching on Streaming Data," Journal of Cryptology , Volume 20 Issue 4, Oct 2007
    • (2007) Journal of Cryptology , vol.20 , Issue.4
    • Ostrovsky, R.1    Skeith III, W.E.2
  • 13
  • 16
    • 67650690349 scopus 로고    scopus 로고
    • Bundle Protocol Specification
    • Nov
    • Keith Scott and Scott Burleigh, "Bundle Protocol Specification," RFC 5050, Nov 2007
    • (2007) RFC , vol.5050
    • Scott, K.1    Burleigh, S.2
  • 18
    • 69949125415 scopus 로고    scopus 로고
    • A New Way to Look at Networking
    • August 30
    • Van Jacobson, "A New Way to Look at Networking," Google Tech Talks, August 30, 2006, http://video.google.com/videoplay?docid=- 6972678839686672840#
    • (2006) Google Tech Talks
  • 19
    • 33244488406 scopus 로고    scopus 로고
    • Secure indexes
    • ePrint Archive, Report 2003/216
    • Eu-Jin Goh, "Secure indexes", Cryptology ePrint Archive, Report 2003/216, 2003.
    • (2003) Cryptology
    • Goh, E.-J.1
  • 20
    • 79951592635 scopus 로고    scopus 로고
    • Practical Techniques for Searches on Encrypted Data, with Dawn Song and David Wagner
    • Practical Techniques for Searches on Encrypted Data, with Dawn Song and David Wagner. In Proc. of IEEE Security and Privacy Symposium, May 2000
    • Proc. of IEEE Security and Privacy Symposium, May 2000
  • 21
    • 44049096900 scopus 로고    scopus 로고
    • Privacy preserving keyword searches on remote encrypted data
    • Yan-Cheng Chang and Michael Mitzenmacher, "Privacy preserving keyword searches on remote encrypted data." in ACNS, 2005.
    • (2005) ACNS
    • Chang, Y.-C.1    Mitzenmacher, M.2
  • 23
    • 0022161539 scopus 로고
    • A Depth-Universal Circuit
    • Stephen A. Cook, H. James Hoover: A Depth-Universal Circuit. SIAM J. Comput. 14(4): 833-839 (1985)
    • (1985) SIAM J. Comput. , vol.14 , Issue.4 , pp. 833-839
    • Cook, S.A.1    Hoover, H.J.2
  • 25
    • 0024631953 scopus 로고
    • What you always wanted to know about Datalog (and never dared to ask)
    • DOI 10.1109/69.43410
    • S. Ceri, G. Gottlob, L. Tanca, "What you always wanted to know about Datalog (and never dared to ask)," IEEE Transactions on Knowledge and Data Engineering (1989) Volume: 1, Issue: 1, Pages: 146-166 (Pubitemid 20607001)
    • (1989) IEEE Transactions on Knowledge and Data Engineering , vol.1 , Issue.1 , pp. 146-166
    • Ceri, S.1    Gottlob, G.2    Tanca, L.3
  • 26
    • 79951652774 scopus 로고    scopus 로고
    • From Self-Forming Mobile Networks to Self-Forming Mobile Content Services
    • Keynote speech
    • Preston Marshall, "From Self-Forming Mobile Networks to Self-Forming Mobile Content Services," Keynote speech, ACM MobiCom 2008, San Francisco, CA, USA, September 16, 2008, http://www.sigmobile.org/mobicom/2008/MobiCom08- Marshall-Keynote.pdf
    • ACM MobiCom 2008, San Francisco, CA, USA, September 16, 2008
    • Marshall, P.1
  • 27
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Pascal Paillier, "Public-Key Cryptosystems Based on Composite Degree Residuosity Classes," EUROCRYPT 1999, pp. 223-238.
    • (1999) EUROCRYPT , pp. 223-238
    • Paillier, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.