Applications of secure multiparty computation / / edited by Peeter Laud and Liina Kamm.
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...
Saved in:
Superior document: | Cryptology and Information Security Series, Volume 13 |
---|---|
: | |
TeilnehmendeR: | |
Place / Publishing House: | Amsterdam, [The Netherlands] : : IOS Press,, 2015. ©2015 |
Year of Publication: | 2015 |
Edition: | 1st ed. |
Language: | English |
Series: | Cryptology and information security series ;
Volume 13. |
Physical Description: | 1 online resource (254 pages) :; illustrations. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Applications of secure multiparty computation / / edited by Peeter Laud and Liina Kamm.
Published: (2015.) -
Secure multi-party computation / edited by Manoj M. Prabhakaran and Amit Sahai.
Published: (2013.) -
Secure telematic applications for national scale projects / edited by Jean-Guy Fontaine and Mikhail Makhaniok.
Published: (c2008.) -
Hands-on oracle application express security : building secure apex applications / / Recx.
by: Recx.
Published: (2013.) -
Neural computation and particle accelerators : research, technology and applications / / Emmerich Chabot and Horace D'Arras, editors.
Published: (c2010.)