Project Details
| Status | Finished |
|---|---|
| Effective start/end date | 12/05/13 → 11/05/15 |
Funding
- US Army/ITA: £157,546.00
Research output
- 4 Conference contribution
-
Access Control in Publicly Verifiable Outsourced Computation
Alderman, J., Janson, C., Cid, C. & Crampton, J., 14 Apr 2015, Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2015. ACM, p. 657-662 6 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile145 Downloads (Pure) -
Picking vs. Guessing Secrets: A Game-Theoretic Analysis
Khouzani, A., Mardziel, P., Cid, C. & Srivatsa, M., 2015, IEEE 28th Computer Security Foundations Symposium. p. 243-257 15 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
-
Optimal Contracts for Outsourced Computation
Pham, V., Rezaei Khouzani, M. & Cid, C., Nov 2014, Proceedings of GameSec 2014 - Fifth Conference on Decision and Game Theory for Security. Springer, Vol. 8840. p. 79-98 20 p. (Lecture Notes in Computer Science - LNCS; vol. 8840).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Open AccessFile407 Downloads (Pure)