Cited By
View all- Azogagh SDelfour VGambs SKillijian MBrenner MCostache ARohloff K(2022)PROBONITEProceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography10.1145/3560827.3563377(23-33)Online publication date: 7-Nov-2022
- Hoang TBehnia RJang YYavuz ARoussev VThuraisingham BCarminati BKantarcioglu M(2020)MOSEProceedings of the Tenth ACM Conference on Data and Application Security and Privacy10.1145/3374664.3375749(17-28)Online publication date: 16-Mar-2020
- Waye LBuiras PArden ORusso AChong SThuraisingham BEvans DMalkin TXu D(2017)Cryptographically Secure Information Flow Control on Key-Value StoresProceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security10.1145/3133956.3134036(1893-1907)Online publication date: 30-Oct-2017
- Show More Cited By