Applications of Secure Multiparty Computation

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...

Full description

Saved in:
Bibliographic Details
Main Author: L. Kamm (ed.) (auth)
Other Authors: P. Laud (ed.) (auth)
Format: Electronic Book Chapter
Language:English
Published: IOS Press 2015
Series:Cryptology and Information Security Series
Subjects:
Online Access:DOAB: download the publication
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!

Internet

DOAB: download the publication
DOAB: description of the publication

3rd Floor Main Library

Holdings details from 3rd Floor Main Library
Call Number: A1234.567
Copy 1 Available