Applications of Secure Multiparty Computation
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...
Kaydedildi:
Yazar: | L. Kamm (ed.) (auth) |
---|---|
Diğer Yazarlar: | P. Laud (ed.) (auth) |
Materyal Türü: | Elektronik Kitap Bölümü |
Dil: | İngilizce |
Baskı/Yayın Bilgisi: |
IOS Press
2015
|
Seri Bilgileri: | Cryptology and Information Security Series
|
Konular: | |
Online Erişim: | DOAB: download the publication DOAB: description of the publication |
Etiketler: |
Etiketle
Etiket eklenmemiş, İlk siz ekleyin!
|
Benzer Materyaller
-
Building the Infrastructure for Cloud Security A Solutions View /
Yazar:: Yeluri, Raghuram, ve diğerleri
Baskı/Yayın Bilgisi: (2014) -
Managing Risk and Information Security Protect to Enable /
Yazar:: Harkins, Malcolm
Baskı/Yayın Bilgisi: (2013) -
Platform Embedded Security Technology Revealed Safeguarding the Future of Computing with Intel Embedded Security and Management Engine /
Yazar:: Ruan, Xiaoyu
Baskı/Yayın Bilgisi: (2014) -
Security in Computer and Information Sciences First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, London, UK, February 26-27, 2018, Revised Selected Papers /
Baskı/Yayın Bilgisi: (2018) -
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers /
Baskı/Yayın Bilgisi: (2020)