-
1
-
-
70349266254
-
FairplayMP: A system for secure multi-party computation
-
ACM, New York, NY, USA
-
Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: CCS '08: Proceedings of the 15th ACM conference on Computer and Communications Security, pp. 257-266. ACM, New York, NY, USA (2008). http://doi. acm. org/10. 1145/1455770. 1455804.
-
(2008)
In: CCS '08: Proceedings of the 15th ACM conference on Computer and Communications Security
, pp. 257-266
-
-
Ben-David, A.1
Nisan, N.2
Pinkas, B.3
-
2
-
-
57049188348
-
Sharemind: A framework for fast privacy-preserving computations
-
Spain, Oct 6-8, 2008, LNCS, Springer
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacy-preserving computations. In: ESORICS 2008: Proceedings of the 13th European Symposium on Research in Computer Security, Málaga, Spain, Oct 6-8, 2008, LNCS, vol. 5283, pp. 192-206. Springer (2008).
-
(2008)
ESORICS 2008: Proceedings of the 13th European Symposium on Research in Computer Security, Málaga
, vol.5283
, pp. 192-206
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
3
-
-
80052383468
-
Sharemind: a framework for fast privacy-preserving computations
-
Report 2008/289
-
Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. Cryptology ePrint Archive, Report 2008/289 (2008). http://eprint. iacr. org/.
-
(2008)
Cryptology ePrint Archive
-
-
Bogdanov, D.1
Laur, S.2
Willemson, J.3
-
4
-
-
84865816316
-
Deploying secure multi-party computation for financial data analysis. (short paper)
-
In: Keromytis, A. (ed.), FC'12. Lecture Notes in Computer Science, Springer Berlin/Heidelberg
-
Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. (short paper). In: Keromytis, A. (ed.) Proceedings of the 16th International Conference on Financial Cryptography and Data Security. FC'12. Lecture Notes in Computer Science, vol. 7397, pp. 57-64. Springer Berlin/Heidelberg (2012).
-
(2012)
Proceedings of the 16th International Conference on Financial Cryptography and Data Security
, vol.7397
, pp. 57-64
-
-
Bogdanov, D.1
Talviste, R.2
Willemson, J.3
-
5
-
-
70350379222
-
Secure multiparty computation goes live
-
Bogetoft, P., Christensen, D. L., Damgård, I., Geisler, M., Jakobsen, T. P., Krøigaard, M., Nielsen, J. D., Nielsen, J. B., Nielsen, K., Pagter, J., Schwartzbach, M. I., Toft, T.: Secure multiparty computation goes live. In: FC '09: Proceedings of the 13th International Conference on Financial Cryptography, pp. 325-343 (2009).
-
(2009)
In: FC '09: Proceedings of the 13th International Conference on Financial Cryptography
, pp. 325-343
-
-
Bogetoft, P.1
Christensen, D.L.2
Damgård, I.3
Geisler, M.4
Jakobsen, T.P.5
Krøigaard, M.6
Nielsen, J.D.7
Nielsen, J.B.8
Nielsen, K.9
Pagter, J.10
Schwartzbach, M.I.11
Toft, T.12
-
6
-
-
84863447066
-
SEPIA: Privacy-Preserving aggregation of multi-domain network events and statistics
-
Washington, DC, USA
-
Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: Privacy-Preserving aggregation of multi-domain network events and statistics. In: Proceedings of the USENIX Security Symposium '10, pp. 223-239. Washington, DC, USA (2010).
-
(2010)
Proceedings of the USENIX Security Symposium '10
, pp. 223-239
-
-
Burkhart, M.1
Strasser, M.2
Many, D.3
Dimitropoulos, X.4
-
8
-
-
33745567199
-
Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation
-
Springer
-
Damgård, I., Fitzi, M., Kiltz, E., Nielsen, J., Toft, T.: Unconditionally secure constant-rounds multi-party computation for equality, comparison, bits and exponentiation. In: Proceedings of The 3rd Theory of Cryptography Conference, TCC 2006, LNCS, vol. 3876. Springer (2006).
-
(2006)
Proceedings of The 3rd Theory of Cryptography Conference, TCC 2006, LNCS
, vol.3876
-
-
Damgård, I.1
Fitzi, M.2
Kiltz, E.3
Nielsen, J.4
Toft, T.5
-
9
-
-
63749090809
-
Distributed privacy preserving k-means clustering with additive secret sharing
-
Doganay, M. C., Pedersen, T. B., Saygin, Y., Savaş, E., Levi, A.: Distributed privacy preserving k-means clustering with additive secret sharing. In: Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS '08, pp. 3-11 (2008).
-
(2008)
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, PAIS '08
, pp. 3-11
-
-
Doganay, M.C.1
Pedersen, T.B.2
Saygin, Y.3
Savaş, E.4
Levi, A.5
-
10
-
-
9244233329
-
A parametric error analysis of Goldschmidt's division algorithm
-
Even, G., Seidel, P. M., Ferguson, W. E.: A parametric error analysis of Goldschmidt's division algorithm. J. Comput. Syst. Sci. 70(1), 118-139 (2005).
-
(2005)
J. Comput. Syst. Sci.
, vol.70
, Issue.1
, pp. 118-139
-
-
Even, G.1
Seidel, P.M.2
Ferguson, W.E.3
-
14
-
-
78649992236
-
TASTY: tool for automating secure two-party computations
-
ACM
-
Henecka, W., Kögl, S., Sadeghi, A. R., Schneider, T., Wehrenberg, I.: TASTY: tool for automating secure two-party computations. In: CCS '10: Proceedings of the 17th ACM conference on Computer and Communications Security, pp. 451-462. ACM (2010).
-
(2010)
CCS '10: Proceedings of the 17th ACM conference on Computer and Communications Security
, pp. 451-462
-
-
Henecka, W.1
Kögl, S.2
Sadeghi, A.R.3
Schneider, T.4
Wehrenberg, I.5
-
15
-
-
80755168310
-
VMCrypt: Modular software architecture for scalable secure computation
-
In: Chen, Y., Danezis, G., Shmatikov, V. (eds.)
-
Malka, L.: VMCrypt: modular software architecture for scalable secure computation. In: Chen, Y., Danezis, G., Shmatikov, V. (eds.) Proceedings of the 18th ACM Conference on Computer and Communications Security. CCS'11. pp. 715-724 (2011).
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security. CCS'11
, pp. 715-724
-
-
Malka, L.1
-
17
-
-
84867726732
-
-
Microsoft Research Tech, Report MSR-TR-2008-141
-
Rodeheffer, T.: Software integer division. Microsoft Research Tech, Report MSR-TR-2008-141 (2008).
-
(2008)
Software integer division
-
-
Rodeheffer, T.1
-
18
-
-
84867731023
-
-
SecureSCM. Technical report D9. 1: Secure Computation Models and Frameworks
-
SecureSCM. Technical report D9. 1: Secure Computation Models and Frameworks. http://www. securescm. org (2008).
-
(2008)
-
-
|