Search

Your search keyword '"Secure Computation"' showing total 106 results

Search Constraints

Start Over You searched for: Descriptor "Secure Computation" Remove constraint Descriptor: "Secure Computation" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
106 results on '"Secure Computation"'

Search Results

1. Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model.

2. 基于区块链和简短可链接环签名的 安全电子投票方案.

4. Scalable Agreement Protocols with Optimal Optimistic Efficiency

5. Card-Based Cryptography Meets 3D Printer

6. Threshold-Optimal MPC with Friends and Foes

8. Secure Function Extensions to Additively Homomorphic Cryptosystems

10. Linear-time 2-party secure merge from additively homomorphic encryption.

11. Just How Fair is an Unreactive World?

12. Synchronizable Fair Exchange

13. Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-Input AND Protocols

14. On Concurrent Multi-party Quantum Computation

19. Minimizing Setup in Broadcast-Optimal Two Round MPC

20. Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition.

21. Flexible multi-client functional encryption for set intersection.

22. Homomorphic encryption for stochastic computing.

23. Efficient Data Collaboration Using Multi-Party Privacy Preserving Machine Learning Framework

24. Homomorphic Encryption on GPU

25. Secure Computations Through Checking Suits of Playing Cards

27. Card-Minimal Protocols for Symmetric Boolean Functions of More than Seven Inputs

28. On Sufficient Oracles for Secure Computation with Identifiable Abort

29. A Linear-Time 2-Party Secure Merge Protocol

30. Adaptively Secure Computation for RAM Programs

32. Trusted Data Space Technology for Data Governance in the IOWN Era.

33. A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem.

34. Research of Cryptographic Protocols for Secure Communications in the Quantum Computer Era.

35. Garbled Circuits from an SCA Perspective

36. A Privacy-Preserving, Two-Party, Secure Computation Mechanism for Consensus-Based Peer-to-Peer Energy Trading in the Smart Grid.

37. Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization.

38. TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server

39. Efficient Perfectly Secure Computation with Optimal Resilience.

40. Privacy-Enhancing Technologies in Biomedical Data Science.

41. Privacy-Preserving IP Verification.

42. Accountable Private Set Cardinality for Distributed Measurement.

43. SOCI: A Toolkit for Secure Outsourced Computation on Integers.

44. Lightweight Privacy-Preserving Medical Diagnosis in Edge Computing.

45. Graph Automorphism Shuffles from Pile-Scramble Shuffles.

46. Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations.

47. Private Function Evaluation with Cards.

48. Multi-key FHE without ciphertext-expansion in two-server model.

49. Gradual GRAM and secure computation for RAM programs1.

50. Gradual GRAM and secure computation for RAM programs1.

Catalog

Books, media, physical & digital resources