Year of publication
Type of media
Type of material
Licence
Language
1–20 of 95 hits
Sort by:
Sort by:
-
Privacy‐friendly weighted‐reputation aggregation protocols against malicious adversaries in cloud services
Wiley | 2016|Keywords: malicious adversary model -
PPEM: Privacy‐preserving EM learning for mixture models
Wiley | 2019|Keywords: malicious adversary -
Practical Private Set Intersection Protocols with Linear Complexity
Springer Verlag | 2010|Keywords: Malicious Adversary -
Private Set Intersection via Searchable Encryption against Malicious Adversaries
National licenceTrans Tech Publications | 2014|Keywords: Malicious Adversary -
Completeness in Two-Party Secure Computation: A Computational View
Online Contents | 2006|Keywords: Malicious Adversary -
Secure similarity coefficients computation for binary data and its extensions
Wiley | 2014|Keywords: malicious adversary -
Completeness in Two-Party Secure Computation: A Computational View
Online Contents | 2006|Keywords: Malicious Adversary -
Outsourcing scheme of ABE encryption secure against malicious adversary
Elsevier | 2018|Keywords: Malicious adversary -
Secure Computation of the Median (and Other Elements of Specified Ranks)
Online Contents | 2010|Keywords: Malicious adversary -
Secure Computation of the Median (and Other Elements of Specified Ranks)
Online Contents | 2010|Keywords: Malicious adversary -
Non-Interactive Secure Computation Based on Cut-and-Choose
Free accessSpringer Verlag | 2014|Keywords: Malicious Adversary -
Systematizing Secure Computation for Research and Decision Support
Springer Verlag | 2014|Keywords: Malicious Adversary -
Constant-Round MPC with Fairness and Guarantee of Output Delivery
Free accessSpringer Verlag | 2015|Keywords: Malicious Adversary -
Efficient Three-Party Computation from Cut-and-Choose
Free accessSpringer Verlag | 2014|Keywords: Malicious Adversary -
An Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels
Springer Verlag | 2013|Keywords: malicious adversary -
Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
Free accessSpringer Verlag | 2013|Keywords: Malicious Adversary
Send my search to (beta)
Send your search query (search terms without filters) to other databases, portals and catalogues to find more interesting hits.
Dimensions:
full data search
or
title and abstract search
Dimensions is a database for abstracts and citations that links information on research funding with the resulting publications, studies and patents.
TIB AV portal
In the TIB AV-Portal, audiovisual media from science and teaching can be foundand own scientific videos can be published.
Specialised Information Service for Mobility and Transport Research (FID move)
Open Research Knowledge Graph (ORKG)
The FID move can be used to search for subject-specific literature, research data and other information from mobility and transport research.
The Open Research Knowledge Graph provides structured descriptions of research content and makes it comparable.
Common Union Catalogue (GVK)
Freely accessible part of the collaborative K10plus catalogue with materials relevant for interlibrary loan and direct delivery services.