Applications of Secure Multiparty Computation

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...

Täydet tiedot

Tallennettuna:
Bibliografiset tiedot
Päätekijä: L. Kamm (ed.) (auth)
Muut tekijät: P. Laud (ed.) (auth)
Aineistotyyppi: Elektroninen Kirjan osa
Kieli:englanti
Julkaistu: IOS Press 2015
Sarja:Cryptology and Information Security Series
Aiheet:
Linkit:DOAB: download the publication
DOAB: description of the publication
Tagit: Lisää tagi
Ei tageja, Lisää ensimmäinen tagi!

Samankaltaisia teoksia