Search

Your search keyword '"Secure Computation"' showing total 74 results

Search Constraints

Start Over You searched for: Descriptor "Secure Computation" Remove constraint Descriptor: "Secure Computation" Database OpenAIRE Remove constraint Database: OpenAIRE
74 results on '"Secure Computation"'

Search Results

1. The Turing Data Safe Haven: An open, scalable, reproducibly deployable, cloud-based Trusted Research Environment for working safely with sensitive data

2. A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem

3. Exponential Correlated Randomness Is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation

4. Secure Distributed Network Optimization Against Eavesdroppers

5. Revealing the landscape of privacy-enhancing technologies in the context of data markets for the IoT: A systematic literature review

6. A Privacy-Preserving, Two-Party, Secure Computation Mechanism for Consensus-Based Peer-to-Peer Energy Trading in the Smart Grid

7. SoK: Efficient Privacy-preserving Clustering

8. Faster homomorphic comparison operations for BGV and BFV

9. Differentially-Private Multi-Party Sketching for Large-Scale Statistics

10. Etoram: A More Efficient ORAM for Secure Computation

11. A Note on the Complexity of Private Simultaneous Messages with Many Parties

12. Secure Computation with Non-Equivalent Penalties in Constant Rounds

13. Метод захищеного обчислення модулярної експоненти на віддалених обчислювальних платформах

16. Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics

17. Interoperable Blockchains for Highly-Integrated Supply Chains in Collaborative Manufacturing

18. SAFELearn: Secure Aggregation for private FEderated Learning

19. Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration

20. Group Structure in Correlations and Its Applications in Cryptography

21. Bivariate Polynomial Codes for Secure Distributed Matrix Multiplication

22. Secure Merge with O(n log log n) Secure Operations

23. Preserving Confidentiality in Data Analytics-as-a-Service

24. Expand-and-Randomize: An Algebraic Approach to Secure Computation

25. Secure 'Ratio' Computation and Efficient Protocol for General Secure Two-Party Comparison

26. Institute of Information Security Issues, Lomonosov MSU

27. Distributed data anonymization

28. Secure Data Retrieval on the Cloud: Homomorphic Encryption meets Coresets

29. Offloading cryptographic services to the SIM card in smartphones

30. On Improving Communication Complexity in Cryptography

31. UC-Secure Multiparty Computation from One-Way Functions Using Stateless Tokens

32. SoK: Modular and Efficient Private Decision Tree Evaluation

33. MOBIUS: Model-Oblivious Binarized Neural Networks

34. Privately Evaluating Decision Trees and Random Forests

35. A design and verification methodology for secure isolated regions

36. Evaluation of Secure Computation in a Distributed Healthcare Setting

37. Mailet: Instant Social Networking under Censorship

38. A Survey on Secure Computation Based on Homomorphic Encryption in Vehicular Ad Hoc Networks

40. Non-interactive Secure Computation from One-Way Functions

41. Low Bandwidth and Latency Secure Computation Oblivious RAM with Three Parties

42. Zero-knowledge proofs for secure computation

43. Secure and scalable match: overcoming the universal circuit bottleneck using group programs

44. A formal foundation for secure remote execution of enclaves

45. Privacy-Preserving Collection and Retrieval of Medical Wearables Data

46. Privacy-Preserving Collection and Retrieval of Medical Wearables Data

47. Wiretapped Oblivious Transfer

48. Trace Oblivious Program Execution

49. Variants of Privacy Preserving Set Intersection and their Practical Applications

50. High-performance secure multi-party computation for data mining applications

Catalog

Books, media, physical & digital resources