搜索结果: 1-4 共查到“军队指挥学 trusted hardware”相关记录4条 . 查询时间(0.093 秒)
Non-Interactive MPC with Trusted Hardware Secure Against Residual Function Attacks
Non-Interactive MPC Communication round complexity Trusted hardware
2019/5/9
Secure multiparty computation (MPC) has been repeatedly optimized, and protocols with two communication rounds and strong security guarantees have been achieved. While progress has been made construct...
Tesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware
cryptocurrency fairness consensus
2017/11/29
We propose Tesseract, a secure real-time cryptocurrency exchange service. Centralized exchange designs are vulnerable to theft of funds, while decentralized exchanges cannot offer real-time cross-chai...
Universally Composable Firewall Architectures using Trusted Hardware
Formal Models Firewalls Universal Composability
2016/1/4
Network firewalls are a standard security measure in computer networks that
connect to the Internet. Often, ready-to-use firewall appliances are trusted to protect the
network from malicious Interne...
Private Information Retrieval Using Trusted Hardware
Private Information Retrieval Trusted Hardware
2008/11/28
Private Information Retrieval Using Trusted Hardware.