Towards Secure Distributed Computations (original) (raw)

Secure distributed programming with value-dependent types

Pierre-yves Strub

Journal of Functional Programming, 2013

View PDFchevron_right

Confidentiality-preserving Proof Theories for Distributed Proof Systems

Nikita Borisov

View PDFchevron_right

Scalability in a Secure Distributed Proof System

Kazuhiro Minami

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Introduction to reliable and secure distributed programming

Xiao Chengwei

View PDFchevron_right

Summary Report on Secure Computation Protocols

Ivan Visconti

2008

View PDFchevron_right

Towards a Formal Verification of a Secure and Distributed System and its Applications

Myla Archer

Computers & Security, 1995

View PDFchevron_right

Secure communications processing for distributed languages

Georges Gonthier

Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344), 1999

View PDFchevron_right

Verifiable computation with massively parallel interactive proofs

Justin Thaler

2012

View PDFchevron_right

Distributed proving in access-control systems

Lujo Bauer

2005

View PDFchevron_right

AAffine Refinement Types for Secure Distributed Programming

Michele Bugliesi

2016

View PDFchevron_right

Confidentiality-Preserving Distributed Proofs of Conjunctive Queries (extended version)

Nikita Borisov

View PDFchevron_right

A Meta-Theorem for Distributed Certification

Ivan Rapaport

ArXiv, 2021

View PDFchevron_right

Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees

Kazuhiro Minami, M. Winslett

Proceedings of the 12th ACM symposium on Access control models and technologies - SACMAT '07, 2007

View PDFchevron_right

Secured distributed algorithms without hardness assumptions

Harel Levin

Journal of Parallel and Distributed Computing

View PDFchevron_right

Single-bit re-encryption with applications to distributed proof systems

Kazuhiro Minami

Proceedings of the 2007 ACM workshop on Privacy in electronic society - WPES '07, 2007

View PDFchevron_right

Towards a Theory of Secure Systems (CMU-CyLab-08-003)

Dilsun Kaynar

2018

View PDFchevron_right

Confidentiality-preserving distributed proofs of conjunctive queries

Nikita Borisov

2009

View PDFchevron_right

Seal: A Framework for Secure Mobile Computations

Jan Vitek

Lecture Notes in Computer Science, 1999

View PDFchevron_right

Modern Security with Traditional Distributed Algorithms

Marko Vukolic

View PDFchevron_right

A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation

Karim Eldefrawy

Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

View PDFchevron_right

Systematizing Secure Computation for Research and Decision Support

Debayan Gupta

9th Conference on Security and Cryptography for Networks, 2014

View PDFchevron_right

A security-preserving compiler for distributed programs: from information-flow policies to cryptographic mechanisms

Gurvan Le Guernic

… of the 16th ACM conference on …, 2009

View PDFchevron_right

Semi-trusted Collaborative Framework for Multi-party Computation

KOK-SENG WONG

KSII Transactions on Internet and Information Systems, 2010

View PDFchevron_right

FlowCert : Probabilistic Certification for Peer-to-Peer Computations

Jean-Louis Roch

2004

View PDFchevron_right

VERIFIABLE COMPUTATIONS: APPROACHES AND PERSPECTIVES

IAEME Publication

View PDFchevron_right

A Proof System for Communicating Sequential Processes

Willem-Paul de Roever

ACM Transactions on Programming Languages and Systems, 1980

View PDFchevron_right

Hardening functions for large scale distributed computations

Doug Szajda

Security and Privacy, 2003. …, 2003

View PDFchevron_right

Affine Refinement Types for Secure Distributed Programming

Stefano Calzavara

ACM Transactions on Programming Languages and Systems, 2015

View PDFchevron_right

Secure Execution of Computations in Untrusted Hosts

Richard Brooks

Lecture Notes in Computer Science, 2006

View PDFchevron_right

Pervasive Parallelism in Highly-Trustable Interactive Theorem Proving Systems

Burkhart Wolff

Lecture Notes in Computer Science, 2013

View PDFchevron_right