Applications of Secure Multiparty Computation
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic Book Chapter |
Language: | English |
Published: |
IOS Press
2015
|
Series: | Cryptology and Information Security Series
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Be the first to leave a comment!