Applications of secure multiparty computation
Secure multi-party computation (SMC), a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. The book will be of interest to all those whose work involves the secure analysis of confi...
Saved in:
| Other Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam, Netherlands
IOS Press
2015
|
| Series: | Cryptology and information security series ;
volume 13 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.9.A25 A775 2015 |
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 104481 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220041940.0 | ||
| 008 | 221104 2015 ne a abi 001 0 eng d | ||
| 010 | |a 2015-944406 | ||
| 020 | |a 9781614995319 (hardback) | ||
| 020 | |a 1614995311 (hardback) | ||
| 039 | 9 | |a 202211041210 |b VLOAD |c 201808071036 |d johari |y 201805031623 |z helmey | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.9.A25 |b A775 2015 | ||
| 245 | 0 | 0 | |a Applications of secure multiparty computation |c edited by Peeter Laud and Liina Kamm. |
| 264 | 1 | |a Amsterdam, Netherlands |b IOS Press |c 2015 | |
| 300 | |a ix, 253 pages |b illustrations |c 21 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 490 | 1 | |a Cryptology and information security series ; |v volume 13 | |
| 504 | |a Includes bibliographical references and index. | ||
| 520 | |a Secure multi-party computation (SMC), a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. The book will be of interest to all those whose work involves the secure analysis of confidential data. | ||
| 592 | |a IV-99895 |b 16/07/2018 |c RM 480.60 |h Yuha | ||
| 650 | 0 | |a Data encryption (Computer science) | |
| 650 | 0 | |a Computer security. | |
| 700 | 1 | |a Laud, Peeter, |e editor. | |
| 700 | 1 | |a Kamm, Liina, |e editor. | |
| 830 | 0 | |a Cryptology and information security series ; |v volume 13 | |
| 999 | |a vtls000061039 |c 104481 |d 104481 | ||


