X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (740) 740
Conference Proceeding (612) 612
Publication (89) 89
Book Chapter (59) 59
Dissertation (31) 31
Government Document (9) 9
Book / eBook (5) 5
Paper (4) 4
Reference (2) 2
Web Resource (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
secure multi-party computation (442) 442
privacy (182) 182
cryptography (171) 171
multi-party computation (156) 156
protocols (142) 142
computer science (135) 135
multi-party (101) 101
security (98) 98
computer science, information systems (78) 78
analysis (66) 66
homomorphic encryption (63) 63
computer science, theory & methods (62) 62
engineering, electrical & electronic (58) 58
computation (54) 54
encryption (52) 52
data privacy (50) 50
protocol (49) 49
physics, multidisciplinary (46) 46
multi-party interaction (44) 44
secret sharing (43) 43
privacy-preserving (39) 39
communication (38) 38
computer science, software engineering (38) 38
quantum physics (38) 38
studies (38) 38
verschlüsselung (38) 38
cloud computing (37) 37
data mining (37) 37
physics (36) 36
servers (34) 34
algorithms (33) 33
data encryption (33) 33
computational modeling (32) 32
privacy preserving (32) 32
telecommunications (32) 32
computational geometry (31) 31
multi-party conversation (31) 31
multi-party system (30) 30
speech (30) 30
computer communication networks (29) 29
quantum cryptography (29) 29
cryptographic protocols (28) 28
multi-party protocol (28) 28
mathematical models (27) 27
data structures, cryptology and information theory (26) 26
会話 (26) 26
algorithm analysis and problem complexity (25) 25
information security (25) 25
oblivious transfer (25) 25
political science (25) 25
elections (24) 24
management of computing and information systems (24) 24
physics, mathematical (24) 24
information (23) 23
quantum computing (23) 23
authentication (22) 22
collaboration (22) 22
complexity theory (22) 22
computer science, hardware & architecture (22) 22
physics, general (22) 22
political parties (22) 22
information systems applications (21) 21
mathematics, applied (21) 21
databases (20) 20
geheimhaltung (20) 20
多人数 (20) 20
情報 (20) 20
artificial intelligence (19) 19
computer science, artificial intelligence (19) 19
computer security (19) 19
optimization (19) 19
data security (18) 18
fairness (18) 18
mathematical physics (18) 18
quantum information technology, spintronics (18) 18
turn-taking (18) 18
communications engineering, networks (17) 17
contracts (17) 17
elementary particles, quantum field theory (17) 17
entanglement (17) 17
gewährleistung (17) 17
interaction (17) 17
management (17) 17
multi-party communication (17) 17
research (17) 17
secure multi-party computations (17) 17
server (17) 17
theoretical, mathematical and computational physics (17) 17
algorithm design and analysis (16) 16
coding and information theory (16) 16
conferences (16) 16
internet (16) 16
sliding mode control (16) 16
systems and data security (16) 16
computer science, general (15) 15
conversation (15) 15
decision making (15) 15
differential privacy (15) 15
distributed computing (15) 15
linguistics (15) 15
more...
Library Location Library Location
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (1235) 1235
Japanese (79) 79
Chinese (26) 26
Korean (14) 14
Turkish (6) 6
Croatian (4) 4
French (4) 4
German (3) 3
Indonesian (2) 2
Portuguese (2) 2
Afrikaans (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


11/2013
The widespread use of personal multimedia-rich devices and multi-party video conferencing have made face-to-face communication among multiple users a promising... 
0544 | Network Coding | Multi-party Video Conferencing
Dissertation
Proceedings of the 15th ACM conference on computer and communications security, ISSN 1543-7221, 10/2008, pp. 257 - 266
We present FairplayMP (for "Fairplay Multi-Party"), a system for secure multi-party computation. Secure computation is one of the great achievements of modern... 
cryptography | secure multi-party computation
Conference Proceeding
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 549 - 560
We present a runtime environment for executing secure programs via a multi-party computation protocol in the preprocessing model. The runtime environment is... 
multi-party computation
Conference Proceeding
Information Sciences, ISSN 0020-0255, 07/2019
Journal Article
Proceedings of the 2017 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2017, pp. 39 - 56
We propose a new, constant-round protocol for multi-party computation of boolean circuits that is secure against an arbitrary number of malicious corruptions.... 
garbled circuit | secure computation | multi-party computation
Conference Proceeding
Proceedings of the 2016 ACM SIGSAC Conference on computer and communications security, ISSN 1543-7221, 10/2016, Volume 24-28-, pp. 830 - 842
We consider the task of secure multi-party computation of arithmetic circuits over a finite field. Unlike Boolean circuits, arithmetic circuits allow natural... 
oblivious transfer | multi-party computation | Oblivious transfer | Multi-party computation
Conference Proceeding
Journal of Network and Computer Applications, ISSN 1084-8045, 06/2014, Volume 42, pp. 120 - 134
Internet of Things (IoT) is going to create a world where physical objects are seamlessly integrated into information networks in order to provide advanced and... 
Secure multi-party computation | Privacy | Internet of Things | Security | Trust management | Trust | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | INFORMATION | MODEL | PARTITIONED DATA | SENSOR NETWORKS | CONTEXT | CHALLENGES | COMPUTER SCIENCE, SOFTWARE ENGINEERING | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | SECURE | COMPUTATION | Surveys | Internet
Journal Article
Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, ISSN 1543-7221, 11/2013, pp. 801 - 812
Recommender systems typically require users to reveal their ratings to a recommender service, which subsequently uses them to provide relevant recommendations.... 
matrix factorization | privacy | recommender systems | multi party computation | garbled circuits
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9451, pp. 127 - 146
Journal Article
IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, 9/2019, pp. 1 - 1
Bitcoin transactions are not truly anonymous as an attacker can attempt to reveal a user's private information by tracing related transactions. Existing... 
privacy protection | multi-party signature | coin mixing | Blockchain
Journal Article
Leibniz International Proceedings in Informatics, LIPIcs, ISSN 1868-8969, 10/2017, Volume 91
Conference Proceeding
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2017, Volume 10174, pp. 175 - 203
Conference Proceeding
Theoretical Computer Science, ISSN 0304-3975, 07/2019
Journal Article
Information Sciences, ISSN 0020-0255, 04/2020, Volume 515, pp. 388 - 403
In this paper, we propose a secure -skyband computation framework in distributed multi-party databases, in which we can compute multi-party -skyband without... 
Privacy-preserving multi-party computation | k-Skyband | Secure skyline | Semi-honest adversary model | Paillier cryptosystem | Distributed computing | Homomorphic encryption
Journal Article
IEEE Journal on Selected Areas in Communications, ISSN 0733-8716, 01/2017, Volume 35, Issue 1, pp. 173 - 187
Journal Article
Ruan Jian Xue Bao/Journal of Software, ISSN 1000-9825, 2018, Volume 29, Issue 2, pp. 473 - 482
Journal Article
by Dou, YZ and Zeng, KX and Li, H and Yang, YL and Gao, B and Ren, K and Li, SQ
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, ISSN 0733-8716, 01/2017, Volume 35, Issue 1, pp. 173 - 187
Centralized spectrum management is one of the key dynamic spectrum access (DSA) mechanisms proposed to govern the spectrum sharing between government incumbent... 
Dynamic spectrum access | secure multi-party computation | protection zone | Paillier cryptosystem | TELECOMMUNICATIONS | ENGINEERING, ELECTRICAL & ELECTRONIC
Journal Article
Theoretical Computer Science, ISSN 0304-3975, 2018
In simultaneous number-in-hand multi-party communication protocols, we have k players, who each receive a private input, and wish to compute a joint function... 
Simultaneous communication complexity | Communication complexity | Multi-party communication complexity | Number in hand
Journal Article
Theoretical Computer Science, ISSN 0304-3975, 01/2020, Volume 803, pp. 207 - 221
Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than Alice by using a public-key cryptosystem without revealing the... 
Yao's millionaire protocol | Secure multi-party computations | Card-based protocols | Real-life hands-on cryptography | Deck of cards
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.