A Framework for Constructing Single Secret Leader Election from MPC

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:European Symposium on Research in Computer Security (27. : 2022 : Kopenhagen; Online) Computer security - ESORICS 2022 ; Part 2
1. Verfasser: Backes, Michael (VerfasserIn)
Weitere Verfasser: Berrang, Pascal (VerfasserIn), Hanzlik, Lucjan (VerfasserIn), Pryvalov, Ivan (VerfasserIn)
Pages:2022
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2022
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Administration of Machine Learning Based Access Control 2022 Nobi, Mohammad Nur
Efficient Unique Ring Signatures from Lattices 2022 Nguyen, Tuong Ngoc
fASLR: Function-Based ASLR for Resource-Constrained IoT Systems 2022 Shao, Xinhui
An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks 2022 Lee, Hyunwoo
How to Verifiably Encrypt Many Bits for an Election? 2022 Devillez, Henri
A Toolbox for Verifiable Tally-Hiding E-Voting Systems 2022 Cortier, Véronique
A Machine Learning Approach to Detect Differential Treatment of Anonymous Users 2022 Wagner, Isabel
A Tale of Four Gates: Privilege Escalation and Permission Bypasses on Android Through App Components 2022 Aldoseri, Abdulla
The Revenge of Password Crackers: Automated Training of Password Cracking Tools 2022 Campi, Alessia Michela Di
Fuzzy Authenticated Key Exchange with Tight Security 2022 Jiang, Mingming
Ring Signatures with User-Controlled Linkability 2022 Fiore, Dario
Verifiable Timed Linkable Ring Signatures for Scalable Payments for Monero 2022 Thyagarajan, Sri AravindaKrishnan
DualDory: Logarithmic-Verifier Linkable Ring Signatures Through Preprocessing 2022 Bootle, Jonathan
Puncturable Signature: A Generic Construction and Instantiations 2022 Jiang, Mei
Public Cloud Data Auditing Revisited: Removing the Tradeoff Between Proof Size and Storage Cost 2022 Susilo, Willy
Utility-Preserving Biometric Information Anonymization 2022 Moriarty, Bill
DEKS: A Secure Cloud-Based Searchable Service Can Make Attackers Pay 2022 Zheng, Yubo
Real-Time Policy Enforcement with Metric First-Order Temporal Logic 2022 Hublet, François
Sequential Digital Signatures for Cryptographic Software-Update Authentication 2022 Poettering, Bertram
Deterministic Wallets for Adaptor Signatures 2022 Erwig, Andreas
Alle Artikel auflisten