1 |
MOHASSEL, P., AND FRANKLIN, M. Efficiency tradeoffs for malicious two-party computation. In Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography (Berlin, Heidelberg, 2006), PKC'06, Springer-Verlag, pp. 458-473.
|
2 |
NIELSEN, J. B., NORDHOLT, P. S., ORLANDI, C., AND BURRA, S. S. A New Approach to Practical Active-Secure Two Party Computation. In Proceedings of the 32th Annual International Cryptology Conferenceon Advancesin Cryptology(2012), CRYPTO '12. http://eprint.iacr.org/2011/091.
|
3 |
OSADCHY, M., PINKAS, B., JARROUS, A., AND MOSKOVICH, B. Scifi - a system for secure face identification. In Proceedings of the 2010 IEEE Symposium on Security and Privacy (Washington, DC, USA, 2010), SP '10, IEEE Computer Society, pp. 239-254.
|
4 |
최희식, 조양현, "모바일 앱 서비스 이용 증가로 인한 보안 위협 분석," (사)디지털산업정보학회 논문지, 2018년3월, 14권1호, pp.45-55.
|
5 |
About Macromill: http://www.macromill.com/honote/20160405/report.html
|
6 |
T. Araki, J. Furukawa, Y. Lindell, A. Nof, and K. Ohara, High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. ACM CCS, 2016.
|
7 |
J. Furukawa, Y. Lindell, A. Nof, and O. Weinstein, High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority, to appear in Eurocrypt2017
|
8 |
MALKA, L. Vmcrypt: modular software architecture for scalable secure computation. In Proceedings of the 18th ACM conference on Computer and communications security (New York, NY, USA, 2011), CCS '11, ACM, pp. 715 - 724.
|