[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2620728.2620768acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Free access

A secure computation framework for SDNs

Published: 22 August 2014 Publication History

Abstract

No abstract available.

References

[1]
Michael T. Goodrich. Randomized shellsort: A simple data-oblivious sorting algorithm. J. ACM, 58(6):27:1--27:26, December 2011.
[2]
Y. Huang, D. Evans, J. Katz, and L. Malka. Faster secure two-party computation using garbled circuits. In Proceedings of the 20th USENIX Conference on Security, SEC'11, pages 35--35, Berkeley, CA, USA, 2011. USENIX Association.
[3]
Andrew Chi-Chih Yao. How to generate and exchange secrets. In 27th Annual Symposium on Foundations of Computer Science, 1986, pages 162--167, October 1986.

Cited By

View all
  • (2024)Towards Private Multi-operator Network SlicingInformation Security and Privacy10.1007/978-981-97-5101-3_20(359-379)Online publication date: 15-Jul-2024
  • (2021)FO-Sketch: A Fast Oblivious Sketch for Secure Network Measurement Service in the CloudElectronics10.3390/electronics1016202010:16(2020)Online publication date: 20-Aug-2021
  • (2021)Towards Encrypted In-Network Storage Services with Secure Near-Duplicate DetectionIEEE Transactions on Services Computing10.1109/TSC.2018.285033314:4(998-1012)Online publication date: 1-Jul-2021
  • Show More Cited By

Index Terms

  1. A secure computation framework for SDNs

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    HotSDN '14: Proceedings of the third workshop on Hot topics in software defined networking
    August 2014
    252 pages
    ISBN:9781450329897
    DOI:10.1145/2620728
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 August 2014

    Check for updates

    Author Tags

    1. security
    2. software-defined networking

    Qualifiers

    • Poster

    Conference

    SIGCOMM'14
    Sponsor:
    SIGCOMM'14: ACM SIGCOMM 2014 Conference
    August 22, 2014
    Illinois, Chicago, USA

    Acceptance Rates

    HotSDN '14 Paper Acceptance Rate 50 of 114 submissions, 44%;
    Overall Acceptance Rate 88 of 198 submissions, 44%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 05 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Towards Private Multi-operator Network SlicingInformation Security and Privacy10.1007/978-981-97-5101-3_20(359-379)Online publication date: 15-Jul-2024
    • (2021)FO-Sketch: A Fast Oblivious Sketch for Secure Network Measurement Service in the CloudElectronics10.3390/electronics1016202010:16(2020)Online publication date: 20-Aug-2021
    • (2021)Towards Encrypted In-Network Storage Services with Secure Near-Duplicate DetectionIEEE Transactions on Services Computing10.1109/TSC.2018.285033314:4(998-1012)Online publication date: 1-Jul-2021
    • (2017)Research Trends in Security and DDoS in SDNSecurity and Communication Networks10.1002/sec.17599:18(6386-6411)Online publication date: 9-Feb-2017
    • (2016)SplitBoxProceedings of the 2016 workshop on Hot topics in Middleboxes and Network Function Virtualization10.1145/2940147.2940150(7-13)Online publication date: 22-Aug-2016
    • (2016)Enabling Secure and Efficient Video Delivery Through Encrypted In-Network CachingIEEE Journal on Selected Areas in Communications10.1109/JSAC.2016.257730134:8(2077-2090)Online publication date: 1-Aug-2016
    • (2016)Empirical Evidences in Software-Defined Network Security: A Systematic Literature ReviewInformation Fusion for Cyber-Security Analytics10.1007/978-3-319-44257-0_11(253-295)Online publication date: 22-Oct-2016
    • (2015)ObliVMProceedings of the 2015 IEEE Symposium on Security and Privacy10.1109/SP.2015.29(359-376)Online publication date: 17-May-2015

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media