Published in: Dagstuhl Reports, Volume 6, Issue 1 (2016)
Kristin Lauter, Radu Sion, and Nigel P. Smart. Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051). In Dagstuhl Reports, Volume 6, Issue 1, pp. 207-223, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2016)
@Article{lauter_et_al:DagRep.6.1.207,
author = {Lauter, Kristin and Sion, Radu and Smart, Nigel P.},
title = {{Modern Cryptography and Security: An Inter-Community Dialogue (Dagstuhl Seminar 16051)}},
pages = {207--223},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2016},
volume = {6},
number = {1},
editor = {Lauter, Kristin and Sion, Radu and Smart, Nigel P.},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.6.1.207},
URN = {urn:nbn:de:0030-drops-58183},
doi = {10.4230/DagRep.6.1.207},
annote = {Keywords: anti-surveillance/anti-censorship systems, homomorphic encryption, post-quantum cryptography, secure hardware design, secure multi-party computation, secure outsourcing, side/covert channels, virtualization security}
}
Published in: Dagstuhl Reports, Volume 1, Issue 12 (2012)
Benny Pinkas, Ahmad-Reza Sadeghi, and Nigel P. Smart. Secure Computing in the Cloud (Dagstuhl Seminar 11491). In Dagstuhl Reports, Volume 1, Issue 12, pp. 1-10, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2012)
@Article{pinkas_et_al:DagRep.1.12.1,
author = {Pinkas, Benny and Sadeghi, Ahmad-Reza and Smart, Nigel P.},
title = {{Secure Computing in the Cloud (Dagstuhl Seminar 11491)}},
pages = {1--10},
journal = {Dagstuhl Reports},
ISSN = {2192-5283},
year = {2012},
volume = {1},
number = {12},
editor = {Pinkas, Benny and Sadeghi, Ahmad-Reza and Smart, Nigel P.},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/DagRep.1.12.1},
URN = {urn:nbn:de:0030-drops-33838},
doi = {10.4230/DagRep.1.12.1},
annote = {Keywords: cloud computing, outsourced computation, verifiability, integrity, confidentiality, trust}
}