Year of publication
Type of material
Licence
Language
61–80 of 405 hits
Sort by:
Sort by:
-
Security and privacy for storage and computation in cloud computing
Elsevier | 2013|Keywords: Secure computation auditing -
Privately Evaluating Decision Trees and Random Forests
Free accessDOAJ | 2016|Keywords: secure computation -
General Composition and Universal Composability in Secure Multiparty Computation
Online Contents | 2008|Keywords: Secure computation -
PMKT: Privacy-preserving Multi-party Knowledge Transfer for financial market forecasting
Elsevier | 2020|Keywords: Secure computation -
The Bottleneck Complexity of Secure Multiparty Computation
Free accessBASE | 2018|Keywords: secure computation -
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model
Online Contents | 2016|Keywords: Secure computation -
Expand-and-Randomize: An Algebraic Approach to Secure Computation
Free accessDOAJ | 2021|Keywords: secure computation -
Deep learning-based medical diagnostic services: A secure, lightweight, and accurate realization1
IOS Press | 2022|Keywords: Secure computation -
Efficient two-party SM2 signing protocol based on secret sharing
Elsevier | 2022|Keywords: Secure computation -
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Online Contents | 2017|Keywords: Efficient secure computation -
How Should We Solve Search Problems Privately?
Online Contents | 2008|Keywords: Secure computation -
Efficient determination of equivalence for encrypted data
Elsevier | 2020|Keywords: Secure computation -
Oblivious Polynomial Evaluation and Secure Set-Intersection from Algebraic PRFs
Online Contents | 2017|Keywords: Efficient secure computation -
On Black-Box Complexity of Universally Composable Security in the CRS Model
Online Contents | 2019|Keywords: UC secure computation -
Distributed multi-party security computation framework for heterogeneous internet of things (IoT) devices
Online Contents | 2021|Keywords: Secure computation -
Laconic Branching Programs from the Diffie-Hellman Assumption
Springer Verlag | 2024|Keywords: unbalanced secure computation -
Differentially-Private Multi-Party Sketching for Large-Scale Statistics
Free accessDOAJ | 2020|Keywords: secure computation -
Completeness for Symmetric Two-Party Functionalities: Revisited
Online Contents | 2017|Keywords: Secure computation
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.