2017 IEEE Security and Privacy Workshops (SPW) 2017
DOI: 10.1109/spw.2017.21
|View full text |Cite
|
Sign up to set email alerts
|

Scalable Secure Multi-party Network Vulnerability Analysis via Symbolic Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 19 publications
(21 reference statements)
0
1
0
Order By: Relevance
“…Using SMPC over web service should satisfy some goals like better adoption (comprehensibility), code available open-source (transparency), no special hardware or software requirements (easy-deployment), valid input checking, among others [110]. Some authors have used SMPC to integrate with hybrid networks [111], and others for vulnerability analysis [112]. Table 7 gives the detailed comparison of existing approaches in Secure Multi-Party Computation with reference to parameters such as-BC, cryptography, healthcare, cloud, Research challenges, pros, and cons of the existing approaches.…”
Section: B Secure Multi-party Computationmentioning
confidence: 99%
“…Using SMPC over web service should satisfy some goals like better adoption (comprehensibility), code available open-source (transparency), no special hardware or software requirements (easy-deployment), valid input checking, among others [110]. Some authors have used SMPC to integrate with hybrid networks [111], and others for vulnerability analysis [112]. Table 7 gives the detailed comparison of existing approaches in Secure Multi-Party Computation with reference to parameters such as-BC, cryptography, healthcare, cloud, Research challenges, pros, and cons of the existing approaches.…”
Section: B Secure Multi-party Computationmentioning
confidence: 99%