Applications of secure multiparty computation /
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | Laud, Peeter (Editor ), Kamm, Liina (Editor ) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam :
IOS Press,
2015.
|
Colección: | Cryptology and information security series ;
volume 13. |
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Applications of secure multiparty computation /
Publicado: (2015) -
Secure multi-party computation /
Publicado: (2013) -
Secure multi-party computation /
Publicado: (2013) -
Platform embedded security technology revealed : safeguarding the future of computing with Intel Embedded Security and Management Engine /
por: Ruan, Xiaoyu
Publicado: (2014) -
Cryptography.
por: Buchanan, William
Publicado: (2017)