Applications of Secure Multiparty Computation

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...

Deskribapen osoa

Gorde:
Xehetasun bibliografikoak
Egile nagusia: L. Kamm (ed.) (auth)
Beste egile batzuk: P. Laud (ed.) (auth)
Formatua: Baliabide elektronikoa Liburu kapitulua
Hizkuntza:ingelesa
Argitaratua: IOS Press 2015
Saila:Cryptology and Information Security Series
Gaiak:
Sarrera elektronikoa:DOAB: download the publication
DOAB: description of the publication
Etiketak: Etiketa erantsi
Etiketarik gabe, Izan zaitez lehena erregistro honi etiketa jartzen!