Benjamin Mood

According to our database1, Benjamin Mood authored at least 12 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
A Hybrid Approach to Secure Function Evaluation using SGX.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
PAL: A pseudo assembly language for optimizing secure function evaluation in mobile devices.
J. Inf. Secur. Appl., 2018

2016
Outsourcing secure two-party computation as a black box.
Secur. Commun. Networks, 2016

Secure outsourced garbled circuit evaluation for mobile devices.
J. Comput. Secur., 2016

Using Intel Software Guard Extensions for Efficient Two-Party Secure Function Evaluation.
Proceedings of the Financial Cryptography and Data Security, 2016

Frigate: A Validated, Extensible, and Efficient Compiler and Interpreter for Secure Computation.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2014
On detecting co-resident cloud instances using network flow watermarking techniques.
Int. J. Inf. Sec., 2014

Reuse It Or Lose It: More Efficient Secure Computation Through Reuse of Encrypted Values.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
PCF: A Portable Circuit Format for Scalable Two-Party Secure Computation.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Towards secure provenance-based access control in cloud environments.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Memory-Efficient Garbled Circuit Generation for Mobile Devices.
Proceedings of the Financial Cryptography and Data Security, 2012

Detecting co-residency with active traffic analysis techniques.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012


  Loading...