Cargando…

Applications of secure multiparty computation /

We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Laud, Peeter (Editor ), Kamm, Liina (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Amsterdam : IOS Press, 2015.
Colección:Cryptology and information security series ; volume 13.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ii 4500
001 EBSCO_ocn919210530
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 150826s2015 ne ob 001 0 eng d
010 |a  2015944406 
040 |a IOSPR  |b eng  |e rda  |e pn  |c IOSPR  |d OCLCO  |d OCLCF  |d NLGGC  |d S4S  |d OCLCQ  |d YDX  |d IDEBK  |d EBLCP  |d N$T  |d SNK  |d DKU  |d AUW  |d IGB  |d D6H  |d VTS  |d N$T  |d EZ9  |d VT2  |d AGLDB  |d OCLCQ  |d G3B  |d WYU  |d S8J  |d S9I  |d CUS  |d STF  |d M8D  |d OCLCQ  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCO 
019 |a 982228298  |a 1048192252  |a 1066630948  |a 1097136792  |a 1235825714  |a 1272923207 
020 |a 9781614995326  |q (electronic bk.) 
020 |a 161499532X  |q (electronic bk.) 
020 |z 9781614995319 
020 |z 1614995311 
029 1 |a AU@  |b 000062553269 
029 1 |a NLGGC  |b 402342038 
035 |a (OCoLC)919210530  |z (OCoLC)982228298  |z (OCoLC)1048192252  |z (OCoLC)1066630948  |z (OCoLC)1097136792  |z (OCoLC)1235825714  |z (OCoLC)1272923207 
037 |a 9781614995326  |b IOS Press  |n http://www.iospress.nl 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 032000  |2 bisacsh 
082 0 4 |a 005.8/2  |2 23 
049 |a UAMI 
245 0 0 |a Applications of secure multiparty computation /  |c edited by Peeter Laud and Liina Kamm. 
264 1 |a Amsterdam :  |b IOS Press,  |c 2015. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Cryptology and information security series ;  |v volume 13 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed January 26, 2018). 
504 |a Includes bibliographical references and index. 
520 |a We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computation (SMC), a cryptographic technology, makes it possible to execute specific programs on confidential data while ensuring that no other sensitive information from the data is leaked. SMC has been the subject of academic study for more than 30 years, but first attempts to use it for actual computations in the early 2000s - although theoretically efficient - were initially not practicable. However, improvements in the situation have made possible the secure solving of even relatively large computational tasks. This book describes how many different computational tasks can be solved securely, yet efficiently. It describes how protocols can be combined to larger applications, and how the security-efficiency trade-offs of different components of an SMC application should be chosen. Many of the results described in this book were achieved as part of the project Usable and Efficient Secure Multi-party Computation (UaESMC), which was funded by the European Commission. The book will be of interest to all those whose work involves the secure analysis of confidential data. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Data encryption (Computer science) 
650 6 |a Chiffrement (Informatique) 
650 7 |a COMPUTERS  |x Information Technology.  |2 bisacsh 
650 7 |a Data encryption (Computer science)  |2 fast 
700 1 |a Laud, Peeter,  |e editor. 
700 1 |a Kamm, Liina,  |e editor. 
710 2 |a IOS Press,  |e publisher. 
776 0 8 |i Print version:  |t Applications of secure multiparty computation.  |d Amsterdam, [The Netherlands] : IOS Press, ©2015  |h ix, 253 pages  |k Cryptology and information security series ; Volume 13  |x 1871-6431  |z 9781614995319 
830 0 |a Cryptology and information security series ;  |v volume 13. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640453  |z Texto completo 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5161932 
938 |a EBSCOhost  |b EBSC  |n 1640453 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis39116297 
938 |a YBP Library Services  |b YANK  |n 15012419 
994 |a 92  |b IZTAP