Analysis of Data and Traffic Management during Privacy Preservation in Secure Multiparty Computation (original) (raw)

Privacy-preserving network congestion control

Hussein Darir

2019

View PDFchevron_right

Secure Data Transaction for Multiparty Processing System

francis xavier

View PDFchevron_right

SECURING DATA IN COMMUNICATION NETWORKS

Jca Ksrce

View PDFchevron_right

A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems

Ramzi Haraty

Computers in Human Behavior, 2014

View PDFchevron_right

Assisting Server for Secure Multi-Party Computation

Wenting Li

2012

View PDFchevron_right

SAS: A Scalar Anonymous Communication System

Riccardo Bettati

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Behavioral Identification of Trusted Third Party in Secure Multiparty Computing Protocol

Poonam Garg

International Journal of Security, Privacy and Trust Management, 2012

View PDFchevron_right

IRJET- ANALYSIS ON PRIVACY PRESERVATION FOR THE DATA GENERATED FROM VARIOUS SOURCES USING SECURE MULTI PARTY COMPUTATION PROTOCOLS

IRJET Journal

IRJET, 2021

View PDFchevron_right

Source Anonymity using multiple mixes in Packet Scheduling

IJCERT Publications

View PDFchevron_right

An optimal strategy for anonymous communication protocols

Riccardo Bettati

Proceedings 22nd International Conference on Distributed Computing Systems

View PDFchevron_right

Real-time mixes: a bandwidth-efficient anonymity protocol

Birgit Pfitzmann

IEEE Journal on Selected Areas in Communications, 1998

View PDFchevron_right

Secure multiparty computation between distrusted networks terminals

Sen-ching S Cheung

2007

View PDFchevron_right

Performance, privacy, and security issues of TCP/IP at the application layer: A comprehensive survey

Tim Murkomen

GSC Advanced Research and Reviews, 2024

View PDFchevron_right

Filtering of Malicious Traffic with Secret Sharing

iir publications

View PDFchevron_right

Enhanced Secured Communication Optimization In Data Packets Using Proxy Protocols

Dr. A.Shaji George LLB.,M.A., M.B.A., MCA., MSc IT., MPhil., Ph.D., Post Doc., D.Sc.,

International Journal of Intelligent Communication, Computing and Networks (IJICCN), 2021

View PDFchevron_right

An Efficient Communication System With Strong Anonymity

david lazar

2018

View PDFchevron_right

k-TTP: a new privacy model for large-scale distributed environments

Assaf Schuster

Knowledge Discovery and Data Mining, 2004

View PDFchevron_right

Future Network Systems and Security Communications in Computer and Information Science 670

Kulwinder Puri

View PDFchevron_right

Achieving Better Privacy for the 3GPP AKA Protocol

Pierre-alain Fouque

Proceedings on Privacy Enhancing Technologies, 2016

View PDFchevron_right

IJERT-A Dynamic Cryptographic Approach To Defend Against Distributed DoS Attacks In Multiparty Applications

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

Private Data Transferring among 'N' Nodes in a group by Using Anonymous ID Assignment

anto theepak

View PDFchevron_right

Reduce to the Max: A Simple Approach for Massive-Scale Privacy-Preserving Collaborative Network Measurements (Short Paper)

Fabio Ricciato

Lecture Notes in Computer Science, 2011

View PDFchevron_right

IJERT-A Survey On Message Passing Interface With Enhancement Security For Untrusted Network

IJERT Journal

International Journal of Engineering Research and Technology (IJERT), 2013

View PDFchevron_right

STATISTICAL DISCLOSURE OF TRAFFIC ON ANONYMOUS SYSTEM USING MANETs

International Journal of Control, Automation, Communication and Systems (IJCACS)

View PDFchevron_right

Secure Data Transfer in Networks

Yevgeniya Sulema

View PDFchevron_right

Privacy-Preserving Query Processing by Multi-Party Computation

Maryam Sepehri

The Computer Journal, 2014

View PDFchevron_right

Summary Report on Secure Computation Protocols

Ivan Visconti

2008

View PDFchevron_right

On performance bottleneck of anonymous communication networks

Steve Graham

2008 IEEE International Symposium on Parallel and Distributed Processing, 2008

View PDFchevron_right

A new security mechanism to perform traffic anonymity with dummy traffic synthesis

wazen shbair

… on Computational Science …, 2009

View PDFchevron_right

Anonymization of Network Traffic Case Study of Web App s Privacy-preserving MSW A4 format

Kouajiep Landry

View PDFchevron_right

Multiparty Communication Using ID3 and Randomized Response Techniques for Preserving Privacy

International Journal IJRITCC

View PDFchevron_right

Security and Privacy in Communication Networks

Joaquin Garcia-Alfaro

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2009

View PDFchevron_right