Secure multi-party computation

Results: 221



#Item
131Combinatorics / DIMACS / Secure multi-party computation / International Multilateral Partnership Against Cyber Threats / Computer security / Security / Secure communication / Mathematics

Efficient and Scalable Cybersecurity Using Algorithms Protected by Electricity (ESCAPE) CALL FOR PARTICIPATION DIMACS and IEEE Workshop The best cyber technologies provide strong guarantees on security and privacy proper

Add to Reading List

Source URL: dimacs.rutgers.edu

Language: English - Date: 2015-02-24 10:51:43
132Data privacy / Law / Ann Cavoukian / Information privacy / Internet privacy / De-identification / Secure multi-party computation / Surveillance / Ethics / Privacy / Data protection

DE-IDENTIFICATION SYMPOSIUM: Preserving Privacy AND Advancing Data Analytics ~ Agenda ~ October 21, 2014 9:30 – 10:00am

Add to Reading List

Source URL: www.ryerson.ca

Language: English - Date: 2015-04-22 10:59:00
133Data privacy / Data protection / Applied ethics / De-identification / Secure multi-party computation / Internet privacy / Data mining / Differential privacy / Medical privacy / Ethics / Privacy / Research ethics

1 Draft Perspective Redefining Genomic Privacy: Trust and

Add to Reading List

Source URL: biorxiv.org

Language: English - Date: 2015-04-22 11:20:20
134Notary / Computer security / Digital signature / Non-repudiation / Secure multi-party computation / Key exchange / Data Encryption Standard / David Chaum / Cryptography / Public-key cryptography / Cryptographic protocols

Davetli Konuşmacılar Director of Sophos Labs, VP SophosLabs & GEO Konu : Threat Landscape Demystified Abstract : Mark Harris will look at the current threat landscape and highlight current trends, such as Blackhat SEO

Add to Reading List

Source URL: www.bilgiguvenligi.org.tr

Language: English - Date: 2013-02-06 12:29:33
135Electronic commerce / RSA / Function / Secret sharing / Secure multi-party computation / Crypt / Commitment scheme / Blinding / Cryptography / Public-key cryptography / Cryptographic protocols

Guaranteed Slowdown, Generalized Encryption Scheme, and Function Sharing Yury Lifshits∗ July 10, 2005 Abstract

Add to Reading List

Source URL: yury.name

Language: English - Date: 2008-11-06 22:10:32
136Secret sharing / Proactive secret sharing / Threshold cryptosystem / Communications protocol / Information-theoretic security / Verifiable secret sharing / Cryptography / Cryptographic protocols / Secure multi-party computation

Communication-Optimal Proactive Secret Sharing for Dynamic Groups Joshua Baron∗ RAND Corporation [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-01 19:43:29
137Secure multi-party computation / Public key infrastructure / Algorithm / Information privacy / Transmission Control Protocol / Preparer Tax Identification Number / Internet privacy / Cryptography / Cryptographic protocols / Public-key cryptography

A Trusted Execution Platform for Multiparty Computation by Sameer Ajmani Submitted to the Department of Electrical Engineering and Computer

Add to Reading List

Source URL: pmg.csail.mit.edu

Language: English - Date: 2002-06-04 13:33:05
138Communications protocol / Secure two-party computation / Oblivious transfer / Secure multi-party computation / Transmission Control Protocol / Two-phase commit protocol / Public-key cryptography / Circuit / Cryptography / Cryptographic protocols / Commitment scheme

Non-Interactive Secure Computation Based on Cut-and-Choose Arash Afshar1 , Payman Mohassel1 , Benny Pinkas2? , and Ben Riva2,3?? 1 University of Calgary

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-25 05:51:56
139Block cipher / E / Computing / Cryptographic protocols / Secure multi-party computation

PDF Document

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-24 11:35:09
140Secure multi-party computation / Secure two-party computation / Cryptography / Homomorphic encryption / Intelligence Advanced Research Projects Activity / Cryptographic primitive / Communications protocol / Cryptographic protocols / Data / Information

Microsoft Word - RFI SPAR-MPC[removed]docx

Add to Reading List

Source URL: www.iarpa.gov

Language: English - Date: 2014-03-06 18:49:04
UPDATE