Literatura académica sobre el tema "Secure multi-party protocols"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Secure multi-party protocols".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Secure multi-party protocols"
Das, Nayana, and Goutam Paul. "Secure multi-party quantum conference and XOR computation." quantum Information and Computation 21, no. 3&4 (2021): 0203–32. http://dx.doi.org/10.26421/qic21.3-4-2.
Texto completoPitalúa-García, Damián. "Unconditionally secure relativistic multi-party biased coin flipping and die rolling." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 477, no. 2252 (2021): 20210203. http://dx.doi.org/10.1098/rspa.2021.0203.
Texto completoGordon, S. Dov, Carmit Hazay, and Phi Hung Le. "Fully Secure PSI via MPC-in-the-Head." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 291–313. http://dx.doi.org/10.56553/popets-2022-0073.
Texto completoLu, Yaohua, and Gangyi Ding. "Quantum Secure Multi-Party Summation with Graph State." Entropy 26, no. 1 (2024): 80. http://dx.doi.org/10.3390/e26010080.
Texto completoRao, Ch Koteswara, Kunwar Singh, and Anoop Kumar. "Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation." Journal of High Speed Networks 27, no. 1 (2021): 67–82. http://dx.doi.org/10.3233/jhs-210652.
Texto completoWang, Ning, Xinying Tian, Xiaodong Zhang, and Song Lin. "Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption." Photonics 10, no. 5 (2023): 558. http://dx.doi.org/10.3390/photonics10050558.
Texto completoAlper, Handan Kılınç, and Alpteki̇n Küpçü. "Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–34. http://dx.doi.org/10.1145/3477530.
Texto completoSun, Xin, Piotr Kulicki, and Mirek Sopek. "Multi-Party Quantum Byzantine Agreement without Entanglement." Entropy 22, no. 10 (2020): 1152. http://dx.doi.org/10.3390/e22101152.
Texto completoZhu, Zong-Wu, and Ru-Wei Huang. "A secure multi-party computation protocol without CRS supporting multi-bit encryption." PLOS ONE 17, no. 3 (2022): e0265572. http://dx.doi.org/10.1371/journal.pone.0265572.
Texto completoShmueli, Erez, and Tamir Tassa. "Mediated Secure Multi-Party Protocols for Collaborative Filtering." ACM Transactions on Intelligent Systems and Technology 11, no. 2 (2020): 1–25. http://dx.doi.org/10.1145/3375402.
Texto completoTesis sobre el tema "Secure multi-party protocols"
Boyle, Elette Chantae. "Secure multi-party protocols under a modern lens." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82436.
Texto completoColbeck, Roger Andrew. "Quantum and relativistic protocols for secure multi-party computation." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612940.
Texto completoZhou, Yanliang. "Efficient Linear Secure Computation and Symmetric Private Information Retrieval Protocols." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752381/.
Texto completoMusic, Luka. "Multi-Party Quantum Cryptography : from Folklore to Real-World." Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS412.
Texto completoLin, Wenjie. "Secure Multi-party Authorization in Clouds." The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1429041745.
Texto completoTurban, Tiina. "A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-25874.
Texto completoZhang, Ping Echo, and 张萍. "Secure multi-party protocol using modern cryptographic technique and tamper resistant hardware." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B49617898.
Texto completoHuang, Wen Kai, and 黃文楷. "A Protocol Description Language for Secure Multi-Party Computation." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/57221064473475505376.
Texto completoAjith, S. "Fast Actively Secure OT Extension for Short Secrets." Thesis, 2017. http://etd.iisc.ac.in/handle/2005/3623.
Texto completoAjith, S. "Fast Actively Secure OT Extension for Short Secrets." Thesis, 2017. http://etd.iisc.ernet.in/2005/3623.
Texto completoLibros sobre el tema "Secure multi-party protocols"
Bîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1.
Texto completoLindell, Yehuda. Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/b13246.
Texto completoOnieva, José A., Javier Lopez, and Jianying Zhou. Secure Multi-Party Non-Repudiation Protocols and Applications. Springer US, 2009. http://dx.doi.org/10.1007/978-0-387-75630-1.
Texto completoCătălin V. Bîrjoveanu and Mirela Bîrjoveanu. Secure Multi-Party e-Commerce Protocols. Springer International Publishing AG, 2022.
Buscar texto completoZhou, Jianying, and José A. Onieva. Secure Multi-Party Non-Repudiation Protocols and Applications. Springer, 2008.
Buscar texto completoZhou, Jianying, and José A. Onieva. Secure Multi-Party Non-Repudiation Protocols and Applications. Springer, 2010.
Buscar texto completoLindell, Yehuda. Composition of Secure Multi-Party Protocols: A Comprehensive Study. Springer London, Limited, 2003.
Buscar texto completoComposition of Secure Multi-Party Protocols: A Comprehensive Study (Lecture Notes in Computer Science). Springer, 2003.
Buscar texto completoCapítulos de libros sobre el tema "Secure multi-party protocols"
Merino, Louis-Henri, and José Cabrero-Holgueras. "Secure Multi-Party Computation." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_17.
Texto completoBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Two-Party E-Commerce Protocols." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_2.
Texto completoLindell, Yehuda. "3. Secure Computation without Agreement." In Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_3.
Texto completoLindell, Yehuda. "4. Universally Composable Multi-party Computation." In Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_4.
Texto completoLindell, Yehuda. "1. Introduction." In Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_1.
Texto completoLindell, Yehuda. "2. The Composition of Authenticated Byzantine Agreement." In Composition of Secure Multi-Party Protocols. Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/978-3-540-39819-6_2.
Texto completoBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Conclusions." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_6.
Texto completoBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Multi-party E-Commerce Protocols for Complex Transactions." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_3.
Texto completoBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Formal Verification of Multi-party Fair Exchange E-Commerce Protocols." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_5.
Texto completoBîrjoveanu, Cătălin V., and Mirela Bîrjoveanu. "Introduction." In Secure Multi-Party E-Commerce Protocols. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-99351-1_1.
Texto completoActas de conferencias sobre el tema "Secure multi-party protocols"
Aljumah, Feras, Andrei Soeanu, Wen Ming Liu, and Mourad Debbabi. "Protocols for secure multi-party private function evaluation." In 2015 First International Conference on Anti-Cybercrime (ICACC). IEEE, 2015. http://dx.doi.org/10.1109/anti-cybercrime.2015.7351946.
Texto completoShmueli, Erez, and Tamir Tassa. "Secure Multi-Party Protocols for Item-Based Collaborative Filtering." In RecSys '17: Eleventh ACM Conference on Recommender Systems. ACM, 2017. http://dx.doi.org/10.1145/3109859.3109881.
Texto completoLuo, Wenjun, and Xiang Li. "A study of secure multi-party elementary function computation protocols." In the 3rd international conference. ACM Press, 2004. http://dx.doi.org/10.1145/1046290.1046293.
Texto completoMovahedi, Mahnush, Jared Saia, and Mahdi Zamani. "Shuffle to Baffle: Towards Scalable Protocols for Secure Multi-party Shuffling." In 2015 IEEE 35th International Conference on Distributed Computing Systems (ICDCS). IEEE, 2015. http://dx.doi.org/10.1109/icdcs.2015.116.
Texto completoPinto, Adriana C. B., Bernardo Machado David, Jeroen van de Graaf, and Anderson C. A. Nascimento. "Universally Composable Committed Oblivious Transfer With A Trusted Initializer." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2012. http://dx.doi.org/10.5753/sbseg.2012.20541.
Texto completoPettai, Martin, and Peeter Laud. "Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active Adversaries." In 2015 IEEE 28th Computer Security Foundations Symposium (CSF). IEEE, 2015. http://dx.doi.org/10.1109/csf.2015.13.
Texto completoKerschbaum, Florian, Daniel Dahlmeier, Axel Schröpfer, and Debmalya Biswas. "On the practical importance of communication complexity for secure multi-party computation protocols." In the 2009 ACM symposium. ACM Press, 2009. http://dx.doi.org/10.1145/1529282.1529730.
Texto completoLiu, Wen, Shou-shan Luo, and Yong-bin Wang. "Secure Multi-Party Comparing Protocol Based on Multi-Threshold Secret Sharing Scheme." In 2010 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2010. http://dx.doi.org/10.1109/wicom.2010.5601327.
Texto completoShi, Lei, Yonglong Luo, and Caiyun Zhang. "Secure Two-Party Multi-Dimensional Vector Comparison Protocol." In 2009 International Conference on Management and Service Science (MASS). IEEE, 2009. http://dx.doi.org/10.1109/icmss.2009.5302846.
Texto completoXiao, Haiyan, and Xiaoyuan Yang. "Secure Multi-party Confidential Protocol of Matrix Factorization." In 2013 International Conference on Intelligent Networking and Collaborative Systems (INCoS). IEEE, 2013. http://dx.doi.org/10.1109/incos.2013.89.
Texto completo