Search

Your search keyword '"Secure Computation"' showing total 525 results

Search Constraints

Start Over You searched for: Descriptor "Secure Computation" Remove constraint Descriptor: "Secure Computation"
525 results on '"Secure Computation"'

Search Results

1. Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model.

2. 基于区块链和简短可链接环签名的 安全电子投票方案.

4. Scalable Agreement Protocols with Optimal Optimistic Efficiency

5. Card-Based Cryptography Meets 3D Printer

6. Threshold-Optimal MPC with Friends and Foes

8. Secure Function Extensions to Additively Homomorphic Cryptosystems

10. Linear-time 2-party secure merge from additively homomorphic encryption.

11. Just How Fair is an Unreactive World?

12. Synchronizable Fair Exchange

13. Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-Input AND Protocols

14. On Concurrent Multi-party Quantum Computation

19. Minimizing Setup in Broadcast-Optimal Two Round MPC

20. Privacy-preserving multi-party PCA computation on horizontally and vertically partitioned data based on outsourced QR decomposition.

21. Flexible multi-client functional encryption for set intersection.

22. Homomorphic encryption for stochastic computing.

23. Efficient Data Collaboration Using Multi-Party Privacy Preserving Machine Learning Framework

24. Homomorphic Encryption on GPU

25. Secure Computations Through Checking Suits of Playing Cards

27. Card-Minimal Protocols for Symmetric Boolean Functions of More than Seven Inputs

28. On Sufficient Oracles for Secure Computation with Identifiable Abort

29. A Linear-Time 2-Party Secure Merge Protocol

30. Adaptively Secure Computation for RAM Programs

32. Computing functions securely : theory, implementation and cryptanalysis, or, Topics in insecurity

33. Trusted Data Space Technology for Data Governance in the IOWN Era.

34. A Secure and Lightweight Multi-Party Private Intersection-Sum Scheme over a Symmetric Cryptosystem.

35. Research of Cryptographic Protocols for Secure Communications in the Quantum Computer Era.

36. Garbled Circuits from an SCA Perspective

37. A Privacy-Preserving, Two-Party, Secure Computation Mechanism for Consensus-Based Peer-to-Peer Energy Trading in the Smart Grid.

38. Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization.

39. OblivShare: Towards Privacy-Preserving File Sharing with Oblivious Expiration Control

40. Privacy-Preserving Computation Tookit on Floating-Point Numbers

41. : Towards Secure and Lightweight Deep Learning as a Medical Diagnostic Service

42. Efficient and Private Divisible Double Auction in Trusted Execution Environment

43. Secure Machine Intelligence and Distributed Ledger

44. A Secure Three-Input AND Protocol with a Standard Deck of Minimal Cards

45. Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC

46. Invited Talk: Resilient Distributed Algorithms

47. TTP-Aided Secure Computation Using (k, n) Threshold Secret Sharing With a Single Computing Server

48. Efficient Perfectly Secure Computation with Optimal Resilience.

49. Privacy-Enhancing Technologies in Biomedical Data Science.

Catalog

Books, media, physical & digital resources