language:
Find link is a tool written by Edward Betts.searching for Secure multi-party computation 11 found (54 total)
alternate case: secure multi-party computation
ITU-T Study Group 16
(467 words)
[view diff]
exact match in snippet
view article
find links to article
Trustworthy AI. Including items on homomorphic encryption, secure multi-party computation, and federated learning. ITU Telecommunication StandardizationDevice-independent quantum cryptography (901 words) [view diff] case mismatch in snippet view article find links to article
2006). "Chapter 5". Quantum And Relativistic Protocols For Secure Multi-Party Computation (Thesis). University of Cambridge. arXiv:0911.3814. VaziraniJonathan Katz (computer scientist) (925 words) [view diff] exact match in snippet view article
authenticated key exchange. He has also worked in the areas of secure multi-party computation, public-key encryption, and digital signatures. He has servedITU-T Study Group 17 (382 words) [view diff] exact match in snippet view article find links to article
Trustworthy AI. Including items on homomorphic encryption, secure multi-party computation, and federated learning. International Telecommunication UnionShlomi Dolev (2,398 words) [view diff] case mismatch in snippet view article find links to article
Equations Automata for Communicationless Information Theoretically Secure Multi-Party Computation". Proceedings of the 3rd International Workshop on SecurityCybernetica (Estonian company) (1,365 words) [view diff] exact match in snippet view article
communications and surveillance on blue borders of Estonia 2011 – Secure multi-party computation technology Sharemind MPC piloted for The Defence Advanced ResearchITU AI for Good (1,268 words) [view diff] exact match in snippet view article find links to article
Trustworthy AI. Including items on homomorphic encryption, secure multi-party computation, and federated learning. The ITU relaunched its Journal ICTJean-Pierre Hubaux (2,247 words) [view diff] exact match in snippet view article find links to article
implementation. He has also led efforts to show that combining secure multi-party computation and homomorphic encryption makes partial results of federatedData collaboratives (2,434 words) [view diff] case mismatch in snippet view article find links to article
see their outcomes without exposing the source data. Through secure Multi-Party Computation, different groups can combine data to work in a decentralizedQuantum nonlocality (9,418 words) [view diff] case mismatch in snippet view article find links to article
(December 2006). Chapter 5. Quantum And Relativistic Protocols For Secure Multi-Party Computation (Thesis), University of Cambridge. arXiv:0911.3814. ColbeckSpatial cloaking (6,863 words) [view diff] exact match in snippet view article find links to article
S2CID 2364389. Du, Wenliang; Atallah, Mikhail J. (2001). "Secure multi-party computation problems and their applications". Proceedings of the 2001 workshop