Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Secure multi-party computation 11 found (54 total)

alternate case: secure multi-party computation

ITU-T Study Group 16 (467 words) [view diff] exact match in snippet view article find links to article

Trustworthy AI. Including items on homomorphic encryption, secure multi-party computation, and federated learning. ITU Telecommunication Standardization
Device-independent quantum cryptography (901 words) [view diff] case mismatch in snippet view article find links to article
2006). "Chapter 5". Quantum And Relativistic Protocols For Secure Multi-Party Computation (Thesis). University of Cambridge. arXiv:0911.3814. Vazirani
Jonathan Katz (computer scientist) (925 words) [view diff] exact match in snippet view article
authenticated key exchange. He has also worked in the areas of secure multi-party computation, public-key encryption, and digital signatures. He has served
ITU-T Study Group 17 (382 words) [view diff] exact match in snippet view article find links to article
Trustworthy AI. Including items on homomorphic encryption, secure multi-party computation, and federated learning. International Telecommunication Union
Shlomi Dolev (2,398 words) [view diff] case mismatch in snippet view article find links to article
Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation". Proceedings of the 3rd International Workshop on Security
Cybernetica (Estonian company) (1,365 words) [view diff] exact match in snippet view article
communications and surveillance on blue borders of Estonia 2011 – Secure multi-party computation technology Sharemind MPC piloted for The Defence Advanced Research
ITU AI for Good (1,268 words) [view diff] exact match in snippet view article find links to article
Trustworthy AI. Including items on homomorphic encryption, secure multi-party computation, and federated learning. The ITU relaunched its Journal ICT
Jean-Pierre Hubaux (2,247 words) [view diff] exact match in snippet view article find links to article
implementation. He has also led efforts to show that combining secure multi-party computation and homomorphic encryption makes partial results of federated
Data collaboratives (2,434 words) [view diff] case mismatch in snippet view article find links to article
see their outcomes without exposing the source data. Through secure Multi-Party Computation, different groups can combine data to work in a decentralized
Quantum nonlocality (9,418 words) [view diff] case mismatch in snippet view article find links to article
(December 2006). Chapter 5. Quantum And Relativistic Protocols For Secure Multi-Party Computation (Thesis), University of Cambridge. arXiv:0911.3814. Colbeck
Spatial cloaking (6,863 words) [view diff] exact match in snippet view article find links to article
S2CID 2364389. Du, Wenliang; Atallah, Mikhail J. (2001). "Secure multi-party computation problems and their applications". Proceedings of the 2001 workshop