Related Books

A Pragmatic Introduction to Secure Multi-party Computation: Introduction 2. Defining Multi-Party Computation 3. Fundamental MPC Protocols 4. Implementation Techniques 5. Oblivious Data Structures 6. Malicious Security 7. Alternative Threat Models 8. Conclusion Acknowledgements References
Language: en
Pages: 186
Authors: David Evans
Categories: Computer networks
Type: BOOK - Published: 2018 - Publisher:

DOWNLOAD EBOOK

Practitioners and researchers seeking a concise, accessible introduction to secure multi-party computation which quickly enables them to build practical systems
A Pragmatic Introduction to Secure Multi-Party Computation
Language: en
Pages: 190
Authors: David Evans
Categories:
Type: BOOK - Published: 2018-12-19 - Publisher: Foundations and Trends (R) in Privacy and Security

DOWNLOAD EBOOK

Practitioners and researchers seeking a concise, accessible introduction to secure multi-party computation which quickly enables them to build practical systems
Security, Privacy and Reliability in Computer Communications and Networks
Language: en
Pages: 444
Authors: Kewei Sha
Categories: Science
Type: BOOK - Published: 2022-09-01 - Publisher: CRC Press

DOWNLOAD EBOOK

Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complica
Exploring the Boundaries of Big Data
Language: en
Pages: 0
Authors: Bart van der Sloot
Categories: Big data
Type: BOOK - Published: 2016 - Publisher:

DOWNLOAD EBOOK

In the investigation Exploring the Boundaries of Big Data The Netherlands Scientific Council for Government Policy (WRR) offers building blocks for developing a
Runtime Verification
Language: en
Pages: 470
Authors: Christian Colombo
Categories: Computers
Type: BOOK - Published: 2018-11-07 - Publisher: Springer

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 18th International Conference on Runtime Verification, RV 2018, held in Limassol, Cyprus, in November 2018