Year of publication
Type of material
Licence
Language
1–50 of 459 hits
Sort by:
Sort by:
-
Secure Evaluation of Quantized Neural Networks
Free accessBASE | 2020|Keywords: Secure Multiparty Computation -
Phoenix:Secure Computation in an Unstable Network with Dropouts and Comebacks
Free accessBASE | 2023|Keywords: Secure Multiparty Computation -
Comment on quantum private comparison protocols with a semi-honest third party
Online Contents | 2012|Keywords: Secure multiparty computation -
Secure Multiparty Computation: From Millionaires Problem to Anonymizer
Taylor & Francis Verlag | 2011|Keywords: secure multiparty computation -
A quantum protocol for millionaire problem with Bell states
Online Contents | 2013|Keywords: Secure multiparty computation -
A scalable privacy-preserving framework for temporal record linkage
Online Contents | 2019|Keywords: Secure multiparty computation -
Anonymous Bitcoin transaction: A solution using secure multiparty computation
Wiley | 2022|Keywords: secure multiparty computation -
Use your brain! Arithmetic 3PC for any modulus with active security
Free accessBASE | 2020|Keywords: Secure Multiparty Computation -
Privacy-preserving credit evaluation system based on blockchain
Elsevier | 2021|Keywords: Secure multiparty computation -
Transforming semi-honest protocols to ensure accountability
Elsevier | 2007|Keywords: Secure multiparty computation -
Oblivious Sampling with Applications to Two-Party k-Means Clustering
Online Contents | 2020|Keywords: Secure multiparty computation -
Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party
Online Contents | 2012|Keywords: Secure multiparty computation -
MPC with Low Bottleneck-Complexity:Information-Theoretic Security and More
Free accessBASE | 2023|Keywords: Secure Multiparty Computation -
Fairness versus Guaranteed Output Delivery in Secure Multiparty Computation
Tema Archive | 2014|Keywords: secure multiparty computation -
Quantum Private Comparison Protocol with W States
Online Contents | 2014|Keywords: Secure multiparty computation -
Privacy-preserving aggregation in life cycle assessment
Online Contents | 2016|Keywords: Secure multiparty computation -
Secure multiparty computation of solid geometric problems and their applications
Elsevier | 2014|Keywords: Secure multiparty computation -
(How) Can Blockchain Contribute to the Management of Systemic Risks in Global Supply Networks?
Free accessFraunhofer Publica | 2019|Keywords: Secure Multiparty Computation -
Secure, Privacy-Preserving Analysis of Distributed Databases
Taylor & Francis Verlag | 2007|Keywords: Secure multiparty computation -
Two Schemes of Privacy-Preserving Trust Evaluation
Elsevier | 2015|Keywords: Secure multiparty computation -
Adaptively Secure MPC with Sublinear Communication Complexity
Online Contents | 2023|Keywords: Secure multiparty computation -
Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation
Free accessDOAJ | 2023|Keywords: secure multiparty computation -
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services
Online Contents | 2017|Keywords: Secure multiparty computation -
Fast Secure Two-Party ECDSA Signing
Online Contents | 2021|Keywords: Secure multiparty computation -
Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services
Wiley | 2016|Keywords: secure multiparty computation -
A new computing environment for collective privacy protection from constrained healthcare devices to IoT cloud services
Online Contents | 2017|Keywords: Secure multiparty computation -
Efficient Constant-Round Multi-party Computation Combining BMR and SPDZ
Online Contents | 2019|Keywords: Secure multiparty computation (MPC) -
Network flow problems with secure multiparty computation
Free accessBASE | 2015|Keywords: Secure multiparty computation -
A Novel and Efficient Quantum Private Comparison Scheme
Online Contents | 2019|Keywords: Secure multiparty computation -
SecureTLM: Private inference for transformer-based large model with MPC
Elsevier | 2024|Keywords: Secure multiparty computation -
Fast Privacy-Preserving Text Classification based on Secure Multiparty Computation
Free accessBASE | 2022|Keywords: secure multiparty computation -
Dynamic Decentralized Reputation System from Blockchain and Secure Multiparty Computation
Free accessDOAJ | 2023|Keywords: secure multiparty computation -
Semi‐Quantum Secure Multiparty Summation and its Applications to Anonymous Auction and Ranking
Wiley | 2024|Keywords: quantum secure multiparty computation -
Improved Secure Multiparty Computation with a Dishonest Majority via Quantum Means
Online Contents | 2012|Keywords: Secure multiparty computation -
Multi-key Fully Homomorphic Encryption without CRS from RLWE
Elsevier | 2023|Keywords: Secure multiparty computation -
Phoenix: Secure Computation in an Unstable Network with Dropouts and Comebacks
Free accessDataCite | 2023|Keywords: Secure Multiparty Computation -
Propensity score matching and stratification using multiparty data without pooling
Wiley | 2023|Keywords: secure multiparty computation -
A scalable privacy-preserving framework for temporal record linkage
Online Contents | 2019|Keywords: Secure multiparty computation -
Topology-Hiding Computation on All Graphs
Online Contents | 2019|Keywords: Secure Multiparty Computation -
Dual protocols for private multi-party matrix multiplication and trust computations
Elsevier | 2017|Keywords: Secure Multiparty Computation (MPC) -
Privacy-preserving training of tree ensembles over continuous data
Free accessBASE | 2022|Keywords: Secure MultiParty Computation -
Novel quantum solutions to privacy-preserving point-line relation determination
IOP Institute of Physics | 2024|Keywords: secure multiparty computation -
Quantum Private Comparison Protocol with W States
Online Contents | 2014|Keywords: Secure multiparty computation -
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
Online Contents | 2023|Keywords: Secure multiparty computation -
Use Your Brain! Arithmetic 3PC for Any Modulus with Active Security
Free accessBASE | 2020|Keywords: Secure Multiparty Computation -
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
Free accessOnline Contents | 2023|Keywords: Secure multiparty computation -
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
Online Contents | 2014|Keywords: Secure multiparty computation
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.