Year of publication
Type of material
Licence
Language
101–120 of 460 hits
Sort by:
Sort by:
-
A Denial of Service attack against fair computations using Bitcoin deposits
Elsevier | 2015|Keywords: Secure multiparty computation -
Non-Interactive Secure Multiparty Computation
Tema Archive | 2014|Keywords: secure multiparty computation -
Privacy Preserving Techniques in the Internet of Things
National licenceTrans Tech Publications | 2013|Keywords: Secure Multiparty Computation (SMC) -
Secure Distributed Computation in the Exponent
National licenceTrans Tech Publications | 2011|Keywords: Secure Multiparty Computation -
Secure Regression on Distributed Databases
Taylor & Francis Verlag | 2005|Keywords: Secure multiparty computation -
Symmetric cryptographic solution to Yao’s millionaires’ problem and an evaluation of secure multiparty computations
Elsevier | 2007|Keywords: Secure multiparty computation -
The complete new solutions to the blind millionaires’ problem in d-dimensional quantum system
Elsevier | 2023|Keywords: Quantum secure multiparty computation -
Concurrent Composition of Secure Protocols in the Timing Model
Online Contents | 2007|Keywords: Secure Multiparty Computation -
Providing accurate models across private partitioned data: Secure maximum likelihood estimation
Project Euclid | 2018|Keywords: secure multiparty computation -
An efficient privacy-preserving P2P protocol for computing maximum value in the presence of active adversaries
Online Contents | 2018|Keywords: Secure multiparty computation -
Privacy-preserving training of tree ensembles over continuous data
Free accessBASE | 2022|Keywords: Secure MultiParty Computation -
Computation and communication efficient approach for federated learning based urban sensing applications against inference attacks
Elsevier | 2024|Keywords: Secure multiparty computation -
Secure outsourcing of sequence comparisons
Online Contents | 2005|Keywords: Secure multiparty computation -
Short Paper: Privacy Preserving Decentralized Netting
Springer Verlag | 2023|Keywords: Secure multiparty computation -
The Cloaked-Centroid protocol: location privacy protection for a group of users of location-based services
Online Contents | 2014|Keywords: Secure multiparty computation -
Symmetric cryptographic protocols for extended millionaires’ problem
Online Contents | 2009|Keywords: secure multiparty computation -
Secure medical health care content protection system (SMCPS) with watermark detection for multi cloud computing environment
Online Contents | 2019Keywords: Secure multiparty computation -
Secure Key Management in the Cloud
Free accessBASE | 2013|Keywords: secure multiparty computation -
Resilient Custody of Crypto-Assets, and Threshold Multisignatures
Free accessDOAJ | 2020|Keywords: secure multiparty computation -
Learning algorithms for vector quantization using vertically partitioned data with IoT
Online Contents | 2021|Keywords: Secure multiparty computation
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.