Search Results - "Secure Multi-Party Computation"
-
1
Authors: et al.
Source: Lecture Notes in Computer Science. :353-373
Subject Terms: Feature Selection, Mutual Information, Secure Multi-party Computation, Privacy
File Description: electronic
-
2
Authors:
Source: RIUMA. Repositorio Institucional de la Universidad de Málaga
Universidad de MálagaSubject Terms: Privacy, Secret Sharing, Derecho a la intimidad, Internet of Things, Internet de los objetos, Secure Multi-Party Computation, Protocolos de comunicaciones
Access URL: https://hdl.handle.net/10630/38348
-
3
Authors: et al.
Contributors: et al.
Source: Kyster, A, Nielsen, F H, Oechsner, S & Scholl, P 2025, Rushing at SPDZ : On the Practical Security of Malicious MPC Implementations. in M Blanton, W Enck & C Nita-Rotaru (eds), 2025 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, pp. 2491-2508, 46th IEEE Symposium on Security and Privacy, SP 2025, San Francisco, United States, 12/05/2025. https://doi.org/10.1109/SP61157.2025.00176
Subject Terms: secure multi-party computation
Access URL: https://research.vu.nl/en/publications/51912561-af0e-4ca5-ba13-ef7ec0681261
https://doi.org/10.1109/SP61157.2025.00176
https://hdl.handle.net/1871.1/51912561-af0e-4ca5-ba13-ef7ec0681261
https://pure.au.dk/portal/en/publications/ae639914-5cae-489d-84a6-ee470c6d0d50
https://doi.org/10.1109/SP61157.2025.00176
http://www.scopus.com/inward/record.url?scp=105009322172&partnerID=8YFLogxK -
4
Authors: et al.
Source: Transactions on Cryptographic Hardware and Embedded Systems, Vol 2025, Iss 3 (2025)
-
5
Authors: et al.
Source: Scientific Reports, Vol 15, Iss 1, Pp 1-33 (2025)
Subject Terms: Blockchain, Secure multi-party computation, Cross-chain, Malicious model, Maximum and minimum values, Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
6
Authors: et al.
Contributors: et al.
Source: Frontiers in Digital Health, Vol 7 (2025)
Subject Terms: secure multi-party computation, Electronic computers. Computer science, Paillier crypto system, Medicine, latent Dirichlet allocation, QA75.5-76.95, Public aspects of medicine, RA1-1270, topic modelling, Shamir secret sharing
-
7
Authors: et al.
Source: GSC Advanced Research and Reviews. 22:104-112
-
8
Authors:
Source: IEEE Access, Vol 13, Pp 135138-135164 (2025)
-
9
Authors:
Source: IEEE Access, Vol 13, Pp 32584-32616 (2025)
-
10
Authors: et al.
Source: Scientific Reports, Vol 15, Iss 1, Pp 1-11 (2025)
Subject Terms: Secure multi-party computation, Quantum private summation, Modular arithmetic, Single photons, Medicine, Science
File Description: electronic resource
Relation: https://doaj.org/toc/2045-2322
-
11
Authors: et al.
Source: Cybersecurity, Vol 8, Iss 1, Pp 1-14 (2025)
Subject Terms: Shamir secret sharing, Secure multi-party computation, Deep learning, Convolution, Softmax, Computer engineering. Computer hardware, TK7885-7895, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
Relation: https://doaj.org/toc/2523-3246
-
12
Authors: et al.
Source: Journal of King Saud University: Computer and Information Sciences, Vol 37, Iss 5, Pp 1-27 (2025)
Subject Terms: Blockchain, Secure multi-party computation, Smart contracts, Multi-party multisets intersection, union and difference computation, Malicious model, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
13
Authors: et al.
Source: Tongxin xuebao, Vol 46, Pp 78-91 (2025)
Subject Terms: private set intersection, oblivious pseudo-random function, edge computing, multi-party shared cache, secure multi-party computation, Telecommunication, TK5101-6720
File Description: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
14
Authors: et al.
Contributors: et al.
Source: Proceedings on Privacy Enhancing Technologies. 2024:330-350
-
15
Authors: et al.
Source: Tongxin xuebao, Vol 46, Pp 168-184 (2025)
Subject Terms: privacy-preserving, large language model, secret sharing, secure multi-party computation, cryptographic inference, Telecommunication, TK5101-6720
File Description: electronic resource
Relation: https://doaj.org/toc/1000-436X
-
16
Authors: et al.
Source: Tongxin xuebao, Vol 46, Pp 238-257 (2025)
Subject Terms: deep learning, privacy-preserving, secure inference, homomorphic encryption, secure multi-party computation, Telecommunication, TK5101-6720
File Description: electronic resource
-
17
Authors: et al.
Source: High-Confidence Computing, Vol 6, Iss 1, Pp 100325- (2026)
Subject Terms: Class imbalance, Hierarchical federated learning, Privacy, Secure Multi-Party Computation, Electronic computers. Computer science, QA75.5-76.95
File Description: electronic resource
-
18
Authors: David Shamoo Excel
Source: World Journal of Advanced Research and Reviews. 23:597-609
-
19
Authors: et al.
Subject Terms: Privacy, Secure Multi-Party Computation, Automotive Security, Federated Learning, Data Obfuscation
Access URL: https://hdl.handle.net/20.500.11769/673549
-
20
Authors:
Source: Proceedings of the 10th International Conference on Information Systems Security and Privacy. :878-883
File Description: application/pdf
Nájsť tento článok vo Web of Science
Full Text Finder