Search

Your search keyword '"Bogdanov, Dan"' showing total 90 results

Search Constraints

Start Over You searched for: Author "Bogdanov, Dan" Remove constraint Author: "Bogdanov, Dan"
90 results on '"Bogdanov, Dan"'

Search Results

1. UN Handbook on Privacy-Preserving Computation Techniques

2. Blueprints for Deploying Privacy Enhancing Technologies in E-Government

3. ZK-SecreC: a Domain-Specific Language for Zero Knowledge Proofs

4. Towards a common performance and effectiveness terminology for digital proximity tracing applications

6. PE-BPMN: Privacy-Enhanced Business Process Model and Notation

7. Deploying Decentralized, Privacy-Preserving Proximity Tracing.

8. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation

9. A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection

10. A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation

11. Privacy-Preserving Statistical Data Analysis on Federated Databases

12. Deploying Secure Multi-Party Computation for Financial Data Analysis : (Short Paper)

13. A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining

14. VirtualLife: Secure Identity Management in Peer-to-Peer Systems

15. Sharemind: A Framework for Fast Privacy-Preserving Computations

22. Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications

27. From Keys to Databases:Real-World Applications of Secure Multi-Party Computation

33. Sharemind: programmeeritav turvaline arvutussüsteem praktiliste rakendustega

35. Octree-based Space Models and Their Use in Solving Path Finding Problems

40. A feasibility analysis of secure multiparty computation deployments

41. VirtualLife : Secure Identity Management in Peer-to-Peer Systems

42. An Improved Type System for a Privacy-aware Programming Language and its Practical Applications

43. A Comprehensive Protocol Suite for Secure Two-Party Computation

44. Turvalise ühisarvutuse rakendamine

45. The Analysis and Design of a Privacy-Preserving Survey System

46. Secure Multi-party Computation Protocols from a High-Level Programming Language

47. A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme

48. Actively Secure Two-Party Computation: Efficient Beaver Triple Generation

49. A Feasibility Analysis of Secure Multiparty Computation Deployments

50. Applying Peer-to-peer Technology In Virtual Worlds

Catalog

Books, media, physical & digital resources