


default search action
CCSW 2019: London, UK
- Radu Sion, Charalampos Papamanthou:
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019. ACM 2019, ISBN 978-1-4503-6826-1
Trustworthy Outsourced Computation
- Michael P. Heinl
, Alexander Giehl, Norbert Wiedermann, Sven Plaga
, Frank Kargl:
MERCAT: A Metric for the Evaluation and Reconsideration of Certificate Authority Trustworthiness. 1-15 - Sepideh Avizheh, Mahmudun Nabi
, Reihaneh Safavi-Naini, Muni Venkateswarlu K.:
Verifiable Computation using Smart Contracts. 17-28 - Robi Pedersen
, Osmanbey Uzunkol:
Secure Delegation of Isogeny Computations and Cryptographic Applications. 29-42
Machine Learning and Security
- Dou Goodman, Xin Hao, Yang Wang, Jiawei Tang, Yunhan Jia, Pei Wang, Tao Wei:
ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield. 43 - Saeed Valizadeh, Marten van Dijk
:
MalPro: A Learning-based Malware Propagation and Containment Modeling. 45-56 - Kalikinkar Mandal, Guang Gong:
PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks. 57-68 - Indranil Jana, Alina Oprea:
AppMine: Behavioral Analytics for Web Application Vulnerability Detection. 69-80
Multiparty Computation
- Harsh Chaudhari, Ashish Choudhury
, Arpita Patra, Ajith Suresh
:
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. 81-92 - En Zhang, Feng-Hao Liu, Qiqi Lai, Ganggang Jin, Yu Li:
Efficient Multi-Party Private Set Intersection Against Malicious Adversaries. 93-104 - Nigel P. Smart, Titouan Tanguy:
TaaS: Commodity MPC via Triples-as-a-Service. 105-116
Privacy
- Ran Gilad-Bachrach
, Kim Laine, Kristin E. Lauter, Peter Rindal, Mike Rosulek:
Secure Data Exchange: A Marketplace in the Cloud. 117-128 - Mireya Jurado
, Geoffrey Smith:
Quantifying Information Leakage of Deterministic Encryption. 129-139 - Panagiotis Rizomiliotis, Stefanos Gritzalis
:
Simple Forward and Backward Private Searchable Symmetric Encryption Schemes with Constant Number of Roundtrips. 141-152 - Tobias F. Pfeffer, Sabine Glesner:
Timing-Sensitive Synchronization for Efficient Secure Multi-Execution. 153-164
Trusted Execution Environments
- Susanne Felsen, Ágnes Kiss, Thomas Schneider
, Christian Weinert
:
Secure and Private Function Evaluation with Intel SGX. 165-181 - Antonis Michalas, Alexandros Bakas, Hai-Van Dang, Alexandr Zalitko:
ABSTRACT: Access Control in Searchable Encryption with the use of Attribute-Based Encryption and SGX. 183 - Fritz Alder
, N. Asokan
, Arseny Kurnikov, Andrew Paverd, Michael Steiner:
S-FaaS: Trustworthy and Accountable Function-as-a-Service using Intel SGX. 185-199
Panel
- Yinqian Zhang, Radu Sion:
Speculative Execution Attacks and Cloud Security. 201

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.