 |
Main
Page
ASIACCS
2017
ASIACCS
2017 Workshops
CCS
2016
CCS
2016
Workshops
CODASPY
2017
CODASPY
2017 Workshops
SACMAT
2017
WiSec
2016
Compilation
Author Index
ACM
SIGSAC Membership Application
|
Compilation
Author Index
Dacosta,
Italo
WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant
Protocol for Local-Area Anonymous Communication
Daemen,
Joan
TIS'16 ~ On Non-uniformity in Threshold
Sharings
D'Alconzo,
Alessandro
CCS'16 ~ POSTER: (Semi)-Supervised Machine
Learning Approaches for Network Security in High-Dimensional Network
Data
Damiani,
Ernesto
CPSS'17 ~ ACM CPSS 2017 Chairs' Welcome
SCC'17
~ Efficient Implementation of a Proxy-based Protocol for Data
Sharing on the Cloud
|
| |
Danezis,
George
WPES'17 ~ TASP: Towards Anonymity Sets
that Persist
WPES'17
~ UnlimitID: Privacy-Preserving Federated Identity Management
using Algebraic MACs
Dang,
Hung
ASIA CCS'17 ~ Proofs of Data Residency:
Checking whether Your Cloud Files Have Been Relocated
d'Annoville,
Jerome
SPRO'16 ~ The ASPIRE Framework for Software
Protection
Darer,
Alexander
WPES'17 ~ Poisoning the Well - Exploring
the Great Firewall's Poisoned DNS Responses
|
| |
Das,
Avisha
IWSPA'17 ~ What's in a URL: Fast Feature
Extraction and Malicious URL Detection
Das,
Sajal K.
CODASPY'17 ~ Statistical Security Incident
Forensics against Data Falsification in Smart Grid Advanced Metering
Infrastructure
Dash,
Santanu Kumar
CODASPY'17 ~ DroidSieve: Fast and Accurate
Classification of Obfuscated Android Malware
AISec'16
~ Prescience: Probabilistic Guidance on the Retraining Conundrum
for Malware Detection
Davi,
Lucas
CCS'16 ~ C-FLAT: Control-Flow Attestation
for Embedded Systems Software
CCS'16
~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Davidson,
Alex
WISCS'16 ~ A Model for Secure and Mutually
Beneficial Software Vulnerability Sharing
|
| |
Davidson,
Drew
ASIA CCS'17 ~ Secure Integration of Web
Content and Applications on Commodity Mobile Operating Systems
Davies,
Gareth T.
ASIA CCS'17 ~ Side Channels in Deduplication:
Trade-offs between Leakage and Efficiency
De
Capitani di Vimercati, Sabrina
CCS'16 ~ 15th Workshop on Privacy in the
Electronic Society (WPES 2016)
WPES'17
~ Foreword
WISCS'16
~ Managing Data Sharing in OpenStack Swift with Over-Encryption
CCS'16
~ Mix&Slice: Efficient Access Revocation in the Cloud
de
Clercq, Ruan
ASIA CCS'17 ~ Short Paper - SCM: Secure
Code Memory Architecture
De
Cnudde, Thomas
TIS'16 ~ Masking AES with d+1 Shares
in Hardware
De
Cristofaro, Emiliano
WiSec'17 ~ POSTER: Experimental Analysis
of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps
de
Fuentes, Jose M.
ASIA CCS'17 ~ TriFlow: Triaging Android
Applications using Speculative Information Flows
|
| |
De
Gaspari, Fabio
SafeConfig'16 ~ AHEAD: A New Architecture
for Active Defense
de
Keulenaer, Ronald
ASIA CCS'17 ~ Short Paper - SCM: Secure
Code Memory Architecture
de
los Santos, Sergio
CCS'16 ~ POSTER: Insights of Antivirus
Relationships when Detecting Android Malware: A Data Analytics Approach
De
Roover, Coen
PLAS'16 ~ Static Detection of User-specified
Security Vulnerabilities in Client-side JavaScript
de
Ruiter, Joeri
ASIA CCS'17 ~ An Attack Against Message
Authentication in the ERTMS Train to Trackside Communication Protocols
De
Santis, Fabrizio
TIS'16 ~ Hiding Higher-Order Univariate
Leakages by Shuffling Polynomial Masking Schemes: A More Efficient,
Shuffled, and Higher-Order Masked AES S-box
|
| |
De
Sutter, Bjorn
CCS'16 ~ 2nd International Workshop on
Software Protection: SPRO 2016
ASIA
CCS'17 ~ Short Paper - SCM: Secure Code Memory Architecture
SPRO'16
~ SPRO'16 Workshop Chairs' Welcome
SPRO'16
~ The ASPIRE Framework for Software Protection
Deaconescu,
Razvan
CCS'16 ~ SandScout: Automatic Detection
of Flaws in iOS Sandbox Profiles
Debbabi,
Mourad
ASIA CCS'17 ~ BinSequence: Fast, Accurate
and Scalable Binary Code Reuse Detection
Debray,
Saumya
CODASPY'17 ~ Analysis of Exception-Based
Control Transfers
Dedhia,
Veer
MTD'16 ~ Have No PHEAR: Networks Without
Identifiers
Degabriele,
Jean Paul
CCS'16 ~ A Surfeit of SSH Cipher Suites
|
| |
Delignat-Lavaud,
Antoine
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
Demetriou,
Soteris
CCS'16 ~ Draco: A System for Uniform and
Fine-grained Access Control for Web Code on Android
Demirel,
Denise
ASIA CCS'17 ~ MoPS: A Modular Protection
Scheme for Long-Term Storage
ASIA
CCS'17 ~ SHORT PAPER: LINCOS - A Storage System Providing Long-Term
Integrity, Authenticity, and Confidentiality
Demontis,
Ambra
AISec'16 ~ Secure Kernel Machines against
Evasion Attacks
Deng,
Juan
SACMAT'17 ~ Poster: On the Safety and Efficiency
of Virtual Firewall Elasticity Control
Deng,
Robert H.
ASIA CCS'17 ~ Short Paper - What You See
is Not What You Get: Leakage-Resilient Password Entry Schemes for Smart
Glasses
|
| |
Deo,
Amit
AISec'16 ~ Prescience: Probabilistic Guidance
on the Retraining Conundrum for Malware Detection
Derhab,
Abdelouahid
CODASPY'17 ~ Sound and Static Analysis
of Session Fixation Vulnerabilities in PHP Web Applications
Derr,
Erik
CCS'16 ~ Reliable Third-Party Library Detection
in Android and its Security Applications
Deshotels,
Luke
CCS'16 ~ SandScout: Automatic Detection
of Flaws in iOS Sandbox Profiles
Desmedt,
Yvo
MIST'16 ~ Function-Based Access Control
(FBAC): From Access Control Matrix to Access Control Tensor
Dessouky,
Ghada
WiSec'17 ~ POSTER: Exploiting Dynamic Partial
Reconfiguration for Improved Resistance Against Power Analysis Attacks
on FPGAs
|
| |
Devadas,
Srinivas
SACMAT'17 ~ Leveraging Hardware Isolation
for Process Level Access Control & Authentication
Dhar,
Aritra
ASIA CCS'17 ~ CoverUp: Privacy Through
"Forced" Participation in Anonymous Communication Networks
Diallo,
Nour
BCC'17 ~ Enabling the Sharing Economy:
Privacy Respecting Contract based on Public Blockchain
BCC'17
~ Unraveling Blockchain-based Crypto-currency System Supporting
Oblivious Transactions: A Formalized Approach
Diao,
Wenrui
WiSec'17 ~ Evading Android Runtime Analysis
Through Detecting Programmed Interactions
Dimitrov,
Vassil
CCS'16 ~ Alternative Implementations of
Secure Real Numbers
Diop,
Aďda
ASIA CCS'17 ~ BlindIDS: Market-Compliant
and Privacy-Friendly Intrusion Detection System over Encrypted Traffic
|
| |
Dmitrienko,
Alexandra
CODASPY'17 ~ Secure Free-Floating Car Sharing
for Offline Cars
ASIA
CCS'17 ~ Secure Wallet-Assisted Offline Bitcoin Payments with
Double-Spender Revocation
Doerner,
Jack
CCS'16 ~ Secure Stable Matching at Scale
Dominic,
Derrick
CPS-SPC'16 ~ Risk Assessment for Cooperative
Automated Driving
Dörre,
Felix
CCS'16 ~ Practical Detection of Entropy
Loss in Pseudo-Random Number Generators
dos
Santos, Daniel Ricardo
CODASPY'17 ~ Aegis: Automatic Enforcement
of Security Policies in Workflow-driven Web Applications
Doupé,
Adam
CODASPY'17 ~ Deep Android Malware Detection
CODASPY'17
~ Panel: Trustworthy Data Science
|
| |
Dragut,
Eduard
SDN-NFVSec'17 ~ Reflections on Data Integration
for SDN
Driessen,
Benedikt
WiSec'17 ~ Constructive and Destructive
Aspects of Adaptive Wormholes for the 5G Tactile Internet
Drijvers,
Manu
WPES'17 ~ Scalable Revocation Scheme for
Anonymous Credentials Based on n-times Unlinkable Proofs
Duan,
Haixin
CCS'16 ~ Host of Troubles: Multiple Host
Ambiguities in HTTP Implementations
SPSM'16
~ What You See Isn't Always What You Get: A Measurement Study
of Usage Fraud on Android Apps
Duan,
Qi
MTD'16 ~ Multi-dimensional Host Identity
Anonymization for Defeating Skilled Attackers
DuBuisson,
Thomas M.
CCS'16 ~ What Else is Revealed by Order-Revealing
Encryption?
Ducas,
Leo
CCS'16 ~ Frodo: Take off the Ring! Practical,
Quantum-Secure Key Exchange from LWE
|
| |
Dulaunoy,
Alexandre
WISCS'16 ~ MISP - The Design and
Implementation of a Collaborative Threat Intelligence Sharing Platform
Dumitras,
Tudor
CCS'16 ~ FeatureSmith: Automatically Engineering
Features for Malware Detection by Mining the Security Literature
Duplys,
Paul
TrustED'16 ~ On the Energy Cost of Channel
Based Key Agreement
Dupont,
Pierre-Alain
ASIA CCS'17 ~ Functional Encryption with
Oblivious Helper
Dupressoir,
François
CCS'16 ~ Strong Non-Interference and Type-Directed
Higher-Order Masking
Durak,
F. Betül
CCS'16 ~ What Else is Revealed by Order-Revealing
Encryption?
|
| |
Dürmuth,
Markus
CCS'16 ~ On the Security of Cracking-Resistant
Password Vaults
TrustED'16
~ Side-Channel Attacks on Fingerprint Matching Algorithms
Dziembowski,
Stefan
CCS'16 ~ Private Circuits III: Hardware
Trojan-Resilience via Testing Amplification
Earl,
Dylan
WiSec'17 ~ Smart-Phones Attacking Smart-Homes
Eberz,
Simon
ASIA CCS'17 ~ Evaluating Behavioral Biometrics
for Continuous Authentication: Challenges and Metrics
Eeten,
Michel van
ASIA CCS'17 ~ The Role of Hosting Providers
in Fighting Command and Control Infrastructure of Financial Malware
Egecioglu,
Omer
CODASPY'17 ~ Towards Practical Privacy-Preserving
Life Cycle Assessment Computations
|
| |
Egele,
Manuel
SPSM'16 ~ CRIOS: Toward Large-Scale iOS
Application Analysis
ASIA
CCS'17 ~ PAYBREAK: Defense Against Cryptographic Ransomware
Eisenbarth,
Thomas
ASIA CCS'17 ~ Cache-Based Application Detection
in the Cloud Using Machine Learning
ASIA
CCS'17 ~ Hit by the Bus: QoS Degradation Attack on Android
Ekberg,
Jan-Erik
CCS'16 ~ C-FLAT: Control-Flow Attestation
for Embedded Systems Software
SPSM'16
~ Hardware Isolation for Trusted Execution
ASIA
CCS'17 ~ The Circle Game: Scalable Private Membership Test Using
Trusted Hardware
El
Aassal, Ayman
CODASPY'17 ~ Comprehensive Method for Detecting
Phishing EmailsUsing Correlation-based Analysis and User Participation
El
Abbadi, Amr
CODASPY'17 ~ Towards Practical Privacy-Preserving
Life Cycle Assessment Computations
ElDefrawy,
Karim
ASIA CCS'17 ~ Lightweight Swarm Attestation:
A Tale of Two LISA-s
|
| |
Elish,
Karim O.
CODASPY'17 ~ Prioritized Analysis of Inter-App
Communication Risks
Elkhiyaoui,
Kaoutar
CCSW'16 ~ Message-Locked Proofs of Retrievability
with Secure Deduplication
Elovici,
Yuval
IoTPTS'17 ~ Let the Cat Out of the Bag:
A Holistic Approach Towards Security Analysis of the Internet of Things
CCS'16
~ POSTER: Towards Exposing Internet of Things: A Roadmap
AISec'16
~ SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity
Research
CPSS'17
~ SIPHON: Towards Scalable High-Interaction Physical Honeypots
Elsabagh,
Mohamed
CODASPY'17 ~ Detecting ROP with Statistical
Learning of Program Characteristics
ASIA
CCS'17 ~ Strict Virtual Call Integrity Checking for C++ Binaries
Elwell,
Jesse
ASIA CCS'17 ~ On the Detection of Kernel-Level
Rootkits Using Hardware Performance Counters
Emura,
Keita
ASIA CCS'17 ~ Group Signatures with Time-bound
Keys Revisited: A New Model and an Efficient Construction
ASIA
CCS'17 ~ Mis-operation Resistant Searchable Homomorphic Encryption
|
| |
Enck,
William
CODASPY'17 ~ A Study of Security Vulnerabilities
on Docker Hub
ASIA
CCS'17 ~ Foreword
WiSec'17
~ Foreword
CCS'16
~ SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
ASIA
CCS'17 ~ SPOKE: Scalable Knowledge Collection and Attack Surface
Analysis of Access Control Policy for Security Enhanced Android
Engel,
Thomas
CCS'16 ~ POSTER: Fingerprinting Tor Hidden
Services
Engelstad,
Paal E.
IWSPA'17 ~ An Internal/Insider Threat Score
for Data Loss Prevention and Detection
Englehardt,
Steven
CCS'16 ~ Online Tracking: A 1-million-site
Measurement and Analysis
Erbacher,
Robert F.
MTD'16 ~ Demo: A Symbolic N-Variant System
Erkin,
Zekeriya
BCC'17 ~ DecReg: A Framework for Preventing
Double-Financing using Blockchain Technology
|
| |
Ernst,
Michael D.
PLAS'16 ~ Automatic Trigger Generation
for Rule-based Smart Homes
Erola,
Arnau
MIST'16 ~ A Tripwire Grammar for Insider
Threat Detection
Erradi,
Mohammed
CCSW'16 ~ Towards an Efficient Policy Evaluation
Process in Multi-Tenancy Cloud Environments
Eshete,
Birhanu
CCS'16 ~ Chainsaw: Chained Automated Workflow-based
Exploit Generation
Esteves-Veríssimo,
Paulo
CPS-SPC'16 ~ Towards Safe and Secure Autonomous
and Cooperative Vehicle Ecosystems
Eugster,
Patrick
CCS'16 ~ Enforcing Least Privilege Memory
Views for Multithreaded Applications
|
| |
Eustice,
Ryan M.
CPS-SPC'16 ~ Risk Assessment for Cooperative
Automated Driving
Evancich,
Nicholas
MTD'16 ~ Moving Target Defense - A Journey
from Idea to Product
Evans,
David
CCS'16 ~ Secure Stable Matching at Scale
Everts,
Maarten H.
WISCS'16 ~ Private Sharing of IOCs and
Sightings
WPES'17
~ Vote to Link: Recovering from Misbehaving Anonymous Users
Evtyushkin,
Dmitry
CCS'16 ~ Covert Channels through Random
Number Generator: Mechanisms, Capacity Estimation and Mitigations
ASIA
CCS'17 ~ On the Detection of Kernel-Level Rootkits Using Hardware
Performance Counters
Eyrolles,
Ninon
SPRO'16 ~ Binary Permutation Polynomial
Inversion and Application to Obfuscation Techniques
SPRO'16
~ Defeating MBA-based Obfuscation
|
| |
Faisal,
Mustafa
CCS'16 ~ Limiting the Impact of Stealthy
Attacks on Industrial Control Systems
Falcarin,
Paolo
SPRO'16 ~ The ASPIRE Framework for Software
Protection
Fan,
Lingling
CCS'16 ~ POSTER: Accuracy vs. Time Cost:
Detecting Android Malware through Pareto Ensemble Pruning
Fan,
Shuqin
CCS'16 ~ Attacking OpenSSL Implementation
of ECDSA with a Few Signatures
Fan,
Xinxin
CCS'16 ~ Sixth International Workshop on
Trustworthy Embedded Devices (TrustED 2016)
TrustED'16
~ TrustED 2016 Chairs' Welcome
Fang,
Yong
ASIA CCS'17 ~ Gossip: Automatically Identifying
Malicious Domains from Mailing List Discussions
|
| |
Farina,
Gian Pietro
CCS'16 ~ Differentially Private Bayesian
Programming
Farley,
Naomi
SACMAT'17 ~ A Framework for the Cryptographic
Enforcement of Information Flow Policies
Farnan,
Oliver
WPES'17 ~ Poisoning the Well - Exploring
the Great Firewall's Poisoned DNS Responses
Faust,
Sebastian
CCS'16 ~ Private Circuits III: Hardware
Trojan-Resilience via Testing Amplification
Feamster,
Nick
CCS'16 ~ PREDATOR: Proactive Recognition
and Elimination of Domain Abuse at Time-of-Registration
Fedorov,
Sergey
BCC'17 ~ Towards Scalable and Private Industrial
Blockchains
|
| |
Feigenbaum,
Joan
WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant
Protocol for Local-Area Anonymous Communication
WPES'17
~ Privacy-Preserving Lawful Contact Chaining: [Preliminary Report]
Feldmann,
Anja
SafeConfig'16 ~ A One-Year Perspective
on Exposed In-memory Key-Value Stores
Felsch,
Dennis
ASIA CCS'17 ~ SECRET: On the Feasibility
of a Secure, Efficient, and Collaborative Real-Time Web Editor
Feng,
Qian
ASIA CCS'17 ~ Extracting Conditional Formulas
for Cross-Platform Bug Search
CCS'16
~ Scalable Graph-based Bug Search for Firmware Images
Fenn,
Gregory
WISCS'16 ~ A Model for Secure and Mutually
Beneficial Software Vulnerability Sharing
Ferraiolo,
David
ABAC'17 ~ Imposing Fine-grain Next Generation
Access Control over Database Queries
|
| |
Ferrari,
Elena
CODASPY'17 ~ SAMPAC: Socially-Aware collaborative
Multi-Party Access Control
Fersch,
Manuel
CCS'16 ~ On the Provable Security of (EC)DSA
Signatures
Fett,
Daniel
CCS'16 ~ A Comprehensive Formal Security
Analysis of OAuth 2.0
Fiadino,
Pierdomenico
CCS'16 ~ POSTER: (Semi)-Supervised Machine
Learning Approaches for Network Security in High-Dimensional Network
Data
Fiebig,
Tobias
SafeConfig'16 ~ A One-Year Perspective
on Exposed In-memory Key-Value Stores
Fiedler,
Roman
MIST'16 ~ Discovering Insider Threats from
Log Data with High-Performance Bioinformatics Tools
|
| |
Fielder,
Andrew
MIST'16 ~ Pragmatic Security: Modelling
IT Security Management Responsibilities for SME Archetypes
Filar,
Bobby
AISec'16 ~ DeepDGA: Adversarially-Tuned
Domain Generation and Detection
Fiore,
Dario
CCS'16 ~ Hash First, Argue Later: Adaptive
Verifiable Computations on Outsourced Data
Fleck,
Dan
CODASPY'17 ~ Detecting ROP with Statistical
Learning of Program Characteristics
ASIA
CCS'17 ~ Strict Virtual Call Integrity Checking for C++ Binaries
Fleischhacker,
Nils
CCS'16 ~ Efficient Cryptographic Password
Hardening Services from Partially Oblivious Commitments
Fogh,
Anders
CCS'16 ~ Prefetch Side-Channel Attacks:
Bypassing SMAP and Kernel ASLR
|
| |
Foltzer,
Adam
CCS'16 ~ 5Gen: A Framework for Prototyping
Applications Using Multilinear Maps and Matrix Branching Programs
Fong,
Noémie
CCS'16 ~ Advanced Probabilistic Couplings
for Differential Privacy
Fong,
Philip W. L.
SACMAT'17 ~ An Enforcement Model for Preventing
Inference Attacks in Social Computing Platforms
Ford,
Bryan
WPES'17 ~ PriFi: A Low-Latency and Tracking-Resistant
Protocol for Local-Area Anonymous Communication
WPES'17
~ Privacy-Preserving Lawful Contact Chaining: [Preliminary Report]
Foresti,
Sara
WISCS'16 ~ Managing Data Sharing in OpenStack
Swift with Over-Encryption
CCS'16
~ Mix&Slice: Efficient Access Revocation in the Cloud
Förg,
Fabian
CODASPY'17 ~ Efficient Commodity Matching
for Privacy-Preserving Two-Party Bartering
|
| |
Fouque,
Pierre-Alain
CCS'16 ~ Strong Non-Interference and Type-Directed
Higher-Order Masking
Fournet,
Cédric
PLAS'16 ~ Formal Verification of Smart
Contracts: Short Paper
CCS'16
~ Hash First, Argue Later: Adaptive Verifiable Computations on
Outsourced Data
PLAS'16
~ Verified Secure Implementations for the HTTPS Ecosystem: Invited
Talk
Fragopoulou,
Paraskevi
CODASPY'17 ~ SAMPAC: Socially-Aware collaborative
Multi-Party Access Control
Franceschina,
Luciano
CCSW'16 ~ Data Analytics: Understanding
Human Behavior based on Mobile Network Data
Francillon,
Aurélien
TrustED'16 ~ Analyzing Thousands of Firmware
Images and a Few Physical Devices. What's Next?
CCS'16
~ Over-The-Top Bypass: Study of a Recent Telephony Fraud
Fratantonio,
Yanick
CCS'16 ~ Drammer: Deterministic Rowhammer
Attacks on Mobile Platforms
|
| |
Freeman,
David Mandell
CCS'16 ~ 9th International Workshop on
Artificial Intelligence and Security: AISec 2016
AISec'16
~ Chairs' Introduction and Welcome to AISec 2016
Freeman,
Kevin
ASIA CCS'17 ~ Automatically Inferring Malware
Signatures for Anti-Virus Assisted Attacks
Freisleben,
Bernd
CCSW'16 ~ Towards an Efficient Policy Evaluation
Process in Multi-Tenancy Cloud Environments
Frey,
Sylvain
CPS-SPC'16 ~ SENAMI: Selective Non-Invasive
Active Monitoring for ICS Intrusion Detection
Fried,
Joshua
CCS'16 ~ A Systematic Analysis of the Juniper
Dual EC Incident
Friedberg,
Liora
WISCS'16 ~ Privacy Risk in Cybersecurity
Data Sharing
|
| |
Froelicher,
David
ASIA CCS'17 ~ Sharing Proofs of Retrievability
across Tenants
Fu,
Shaojing
SCC'17 ~ A Secure Algorithm for Outsourcing
Matrix Multiplication Computation in the Cloud
Fuchsbauer,
Georg
CCS'16 ~ BeleniosRF: A Non-interactive
Receipt-Free Electronic Voting Scheme
Fuhry,
Benny
CCSW'16 ~ Encrypting Analytical Web Applications
Fujino,
Akinori
CCS'16 ~ Poster: Toward Automating the
Generation of Malware Analysis Reports Using the Sandbox Logs
Fujiwara,
Mikio
ASIA CCS'17 ~ SHORT PAPER: LINCOS - A Storage
System Providing Long-Term Integrity, Authenticity, and Confidentiality
|
| |
Fumera,
Giorgio
AISec'16 ~ Secure Kernel Machines against
Evasion Attacks
Fung,
Carol
SDN-NFVSec'17 ~ Dynamic DDoS Defense Resource
Allocation using Network Function Virtualization
Furukawa,
Jun
CCS'16 ~ Demo: High-Throughput Secure Three-Party
Computation of Kerberos Ticket Generation
CCS'16
~ High-Throughput Semi-Honest Secure Three-Party Computation
with an Honest Majority
|
| |
(Return
to Top to Navigate the SIGSAC 2016-17 Compilation Author Index) |