Applications of secure multiparty computation
Secure multi-party computation (SMC), a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. The book will be of interest to all those whose work involves the secure analysis of confi...
Saved in:
| Other Authors: | Laud, Peeter (Editor), Kamm, Liina (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam, Netherlands
IOS Press
2015
|
| Series: | Cryptology and information security series ;
volume 13 |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014)
by: Brooks, Richard R.
Published: (2014)
Crafting the infosec playbook
by: Bollinger, Jeff, et al.
Published: (2015)
by: Bollinger, Jeff, et al.
Published: (2015)
Writing secure code
by: Howard, Michael 1965-
Published: (2003)
by: Howard, Michael 1965-
Published: (2003)
Cryptography and security services mechanisms and applications
by: Mogollon, Manuel
Published: (2007)
by: Mogollon, Manuel
Published: (2007)
Securing information and communications systems principles, technologies, and applications
Published: (2008)
Published: (2008)
7A Security's official guide cryptography
by: Burnett
Published: (2001)
by: Burnett
Published: (2001)
Identity-based cryptography
Published: (2009)
Published: (2009)
Cryptography protocols, design, and applications
Published: (2012)
Published: (2012)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2011)
by: Stallings, William
Published: (2011)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2014)
by: Stallings, William
Published: (2014)
Cryptography and network security principles and practice
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Multimedia forensics and security
Published: (2009)
Published: (2009)
Cryptography and network security principles and practices
by: Stallings
Published: (2003)
by: Stallings
Published: (2003)
Cryptography and network security principles and practice
by: Stallings
Published: (1998)
by: Stallings
Published: (1998)
The Kish cypher the story of KLJN for unconditional security
by: Kish, Laszlo B.
Published: (2017)
by: Kish, Laszlo B.
Published: (2017)
Citizen-centric privacy requirements engineering framework
by: Nor Asiakin Hasbullah
Published: (2017)
by: Nor Asiakin Hasbullah
Published: (2017)
Cryptography infosec pro guide
by: Oriyano, Sean-Philip
Published: (2013)
by: Oriyano, Sean-Philip
Published: (2013)
CRYPTOGRAPHY AND NETWORK SECURITY : PRINCIPLES AND PRACTICE /
by: Stallings, William
Published: (2023)
by: Stallings, William
Published: (2023)
Handbook of research on modern cryptographic solutions for computer and cyber security
Published: (2016)
Published: (2016)
Multimedia content encryption techniques and applications
by: Lian, Shiguo
Published: (2009)
by: Lian, Shiguo
Published: (2009)
Security in computing
by: Pfleegar, Charles P.
Published: (1997)
by: Pfleegar, Charles P.
Published: (1997)
Security and privacy in social networks
Published: (2013)
Published: (2013)
Information security, coding theory and related combinatorics information coding and combinatorics
Published: (2011)
Published: (2011)
A cyber exercise post assessment framework in Malaysia perspective
by: Arniyati Ahmad
Published: (2016)
by: Arniyati Ahmad
Published: (2016)
Cryptographic solutions for secure online banking and commerce
Published: (2016)
Published: (2016)
Digital watermarking 6th International Workshop, IWDW 2007, Guanzhou, China, December 3-5, 2007 : proceedings
Published: (2008)
Published: (2008)
Understanding cryptography a textbook for students and practitioners
by: Paar, Christof, et al.
Published: (2010)
by: Paar, Christof, et al.
Published: (2010)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Computer and intrusion forensics
Published: (2003)
Published: (2003)
Blockchain blueprint for a new economy
by: Swan, Melanie
Published: (2015)
by: Swan, Melanie
Published: (2015)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2015)
by: Stallings, William, et al.
Published: (2015)
Cryptography, automata and learning theory
Published: (2011)
Published: (2011)
Computer security art and science
by: Bishop, Matt
Published: (2019)
by: Bishop, Matt
Published: (2019)
Similar Items
-
INTRODUCTION TO Computer and Network Security : NAVIGATING SHADES OF GRAY /
by: Brooks, Richard R.
Published: (2014) -
Crafting the infosec playbook
by: Bollinger, Jeff, et al.
Published: (2015) -
Writing secure code
by: Howard, Michael 1965-
Published: (2003) -
Cryptography and security services mechanisms and applications
by: Mogollon, Manuel
Published: (2007) -
Securing information and communications systems principles, technologies, and applications
Published: (2008)


