Zobrazeno 1 - 10
of 63
pro vyhledávání: '"Martin Hirt"'
Publikováno v:
Theory of Cryptography ISBN: 9783030904586
TCC (1)
TCC (1)
The goal of secure multi-party computation (MPC) is to allow a set of parties to perform an arbitrary computation task, where the security guarantees depend on the set of parties that are corrupted. The more parties are corrupted, the less is guarant
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::70b5100eb84039f51a49dce5fe305a08
https://doi.org/10.1007/978-3-030-90459-3_23
https://doi.org/10.1007/978-3-030-90459-3_23
Publikováno v:
Theory of Cryptography ISBN: 9783030904524
TCC (2)
TCC (2)
Secure multi-party computation (MPC) allows a set of n parties to jointly compute an arbitrary computation over their private inputs. Two main variants have been considered in the literature according to the underlying communication model. Synchronou
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7ad3dcf97c1d76f85368a0e123ebc7ce
https://doi.org/10.1007/978-3-030-90453-1_2
https://doi.org/10.1007/978-3-030-90453-1_2
Eine Strategie mag auf dem Papier gut klingen, mit den richtigen Modellen und Theorien, die sie unterstützen, aber wenn es eine gestörte Verbindung zwischen dem Leadership und den Mitarbeitern gibt, ist die Strategie zum Scheitern verurteilt. Letzt
Publikováno v:
CCS
Protocols for secure multiparty computation enable a set of parties to compute a joint function of their inputs, while preserving privacy, correctness and more. In theory, secure computation has broad applicability and can be used to solve many of th
Beat the odds with a bold strategy from McKinsey & Company'Every once in a while, a genuinely fresh approach to business strategy appears'—legendary business professor Richard Rumelt, UCLA McKinsey & Company's newest, most definitive, and most irre
Autor:
Martin Hirt, Adam Smith
The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.The total of 45 revised full papers presented in the
Publikováno v:
Advances in Cryptology – CRYPTO 2016 ISBN: 9783662530078
CRYPTO (2)
Hirt, M, Maurer, U M, Tschudi, D & Zikas, V 2016, Network-Hiding Communication and Applications to Multi-party Protocols . i CRYPTO . https://doi.org/10.1007/978-3-662-53008-5_12
Lecture Notes in Computer Science, 9815
Advances in Cryptology – CRYPTO 2016. 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II
CRYPTO (2)
Hirt, M, Maurer, U M, Tschudi, D & Zikas, V 2016, Network-Hiding Communication and Applications to Multi-party Protocols . i CRYPTO . https://doi.org/10.1007/978-3-662-53008-5_12
Lecture Notes in Computer Science, 9815
Advances in Cryptology – CRYPTO 2016. 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II
As distributed networks are heavily used in modern applications, new security challenges emerge. In a multi-party computation in short, MPC protocol over an incomplete network, such a challenge is to hide, to the extent possible, the topology of the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1486251342c6afc677022111f1b1f24e
https://doi.org/10.1007/978-3-662-53008-5_12
https://doi.org/10.1007/978-3-662-53008-5_12
Publikováno v:
Advances in Cryptology – ASIACRYPT 2016 ISBN: 9783662538890
ASIACRYPT (2)
ASIACRYPT (2)
Secure multi-party computation MPC allows several mutually distrustful parties to securely compute a joint function of their inputs and exists in two main variants: In synchronous MPC parties are connected by a synchronous network with a global clock
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a750a242789860c05c66e3cc50328a6e
https://doi.org/10.1007/978-3-662-53890-6_33
https://doi.org/10.1007/978-3-662-53890-6_33
Autor:
Adam Smith, Martin Hirt
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662536407
Theory of Cryptography
Theory of Cryptography
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ca5e52be53cc6c0730e8609a8625fe0f
https://doi.org/10.1007/978-3-662-53641-4
https://doi.org/10.1007/978-3-662-53641-4
Publikováno v:
International Journal of Dermatology. 50:564-570
The Task force for Skin Care for All: Community Dermatology seeks to meet WHO objectives, to draw attention to the role of Traditional Health Practitioners and to develop integrated skin care. In many African countries patients will first use traditi