and Computation

Results: 3364



#Item
131

Aggregating Private Sparse Learning Models Using Multi-Party Computation Lu Tian, Bargav Jayaraman, Quanquan Gu, and David Evans University of Virginia https://oblivc.org/ppml

Add to Reading List

Source URL: oblivc.org

- Date: 2017-07-07 14:12:10
    132

    LEGO for Two Party Secure Computation Jesper Buus Nielsen and Claudio Orlandi BRICS, Department of Computer Science, Aarhus Universitet, ˚ Abogade 34, 8200 ˚ Arhus, Denmark

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2008-10-03 03:53:01
      133

      A Novel Paradigm of Parallel Computation and its Use to Implement Simple High-Performance Hardware R. W. Hartenstein, A. G. Hirschbiel, K. Schmidt, M. Weber Universitaet Kaiserslautern, F.B. Informatik, Bau 12, Postfach

      Add to Reading List

      Source URL: www.fpl.uni-kl.de

      - Date: 2013-11-13 04:15:54
        134

        Constant-Round Asynchronous Multi-Party Computation Based on One-Way Functions Sandro Coretti∗†1 , Juan Garay‡2 , Martin Hirt3 , and Vassilis Zikas§†‡4 1

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2016-11-22 20:50:31
          135

          Global Caching, Inverse Roles and Fixpoint Logics Rajeev Gor´e Logic and Computation Group College of Engineering and Computer Science The Australian National University

          Add to Reading List

          Source URL: ceur-ws.org

          - Date: 2009-07-07 04:46:34
            136

            Robustness for Free in Unconditional Multi-Party Computation Martin Hirt and Ueli Maurer ETH Zurich, Switzerland Manuscript, February 12, 2001

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2001-03-07 10:36:36
              137

              Recursive Computation of Regions and Connectivity in Networks Mengmeng Liu, Nicholas E. Taylor, Wenchao Zhou, Zachary G. Ives, Boon Thau Loo Computer and Information Science Department, University of Pennsylvania Philade

              Add to Reading List

              Source URL: www.cis.upenn.edu

              - Date: 2008-10-30 11:55:11
                138

                David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗ Gil Segev∗

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2008-01-31 10:30:41
                  139

                  Draft version of book chapter published in: Hourcade, J.P. and Nathan, L. (2013). Human Computation and Conflict. In Michelucci (Ed.) Handbook of Human Computation (pp. 993­1009). New York: Spr

                  Add to Reading List

                  Source URL: homepage.cs.uiowa.edu

                  - Date: 2013-12-11 10:22:59
                    140

                    A ray casting method for the computation of the area of feasible solutions for multicomponent systems: Theory, applications and FACPACK-implementation. Mathias Sawalla , Klaus Neymeyra,b a Universit¨ at

                    Add to Reading List

                    Source URL: alf.math.uni-rostock.de

                    - Date: 2016-12-06 11:03:08
                      UPDATE