Artículos de revistas sobre el tema "Secure multi-party protocols"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Secure multi-party protocols".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Das, Nayana, and Goutam Paul. "Secure multi-party quantum conference and XOR computation." quantum Information and Computation 21, no. 3&4 (2021): 0203–32. http://dx.doi.org/10.26421/qic21.3-4-2.
Texto completoPitalúa-García, Damián. "Unconditionally secure relativistic multi-party biased coin flipping and die rolling." Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences 477, no. 2252 (2021): 20210203. http://dx.doi.org/10.1098/rspa.2021.0203.
Texto completoGordon, S. Dov, Carmit Hazay, and Phi Hung Le. "Fully Secure PSI via MPC-in-the-Head." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 291–313. http://dx.doi.org/10.56553/popets-2022-0073.
Texto completoLu, Yaohua, and Gangyi Ding. "Quantum Secure Multi-Party Summation with Graph State." Entropy 26, no. 1 (2024): 80. http://dx.doi.org/10.3390/e26010080.
Texto completoRao, Ch Koteswara, Kunwar Singh, and Anoop Kumar. "Oblivious stable sorting protocol and oblivious binary search protocol for secure multi-party computation." Journal of High Speed Networks 27, no. 1 (2021): 67–82. http://dx.doi.org/10.3233/jhs-210652.
Texto completoWang, Ning, Xinying Tian, Xiaodong Zhang, and Song Lin. "Quantum Secure Multi-Party Summation with Identity Authentication Based on Commutative Encryption." Photonics 10, no. 5 (2023): 558. http://dx.doi.org/10.3390/photonics10050558.
Texto completoAlper, Handan Kılınç, and Alpteki̇n Küpçü. "Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation." ACM Transactions on Privacy and Security 25, no. 1 (2022): 1–34. http://dx.doi.org/10.1145/3477530.
Texto completoSun, Xin, Piotr Kulicki, and Mirek Sopek. "Multi-Party Quantum Byzantine Agreement without Entanglement." Entropy 22, no. 10 (2020): 1152. http://dx.doi.org/10.3390/e22101152.
Texto completoZhu, Zong-Wu, and Ru-Wei Huang. "A secure multi-party computation protocol without CRS supporting multi-bit encryption." PLOS ONE 17, no. 3 (2022): e0265572. http://dx.doi.org/10.1371/journal.pone.0265572.
Texto completoShmueli, Erez, and Tamir Tassa. "Mediated Secure Multi-Party Protocols for Collaborative Filtering." ACM Transactions on Intelligent Systems and Technology 11, no. 2 (2020): 1–25. http://dx.doi.org/10.1145/3375402.
Texto completoDa-Wei Zhou, Da-Wei Zhou, Su-Zhen Cao Da-Wei Zhou, Xiao Zhao Su-Zhen Cao, Dan-Dan Xing Xiao Zhao, and Zheng Wang Dan-Dan Xing. "Efficient First-price Sealed E-auction Protocol Under Secure Multi-party Computational Malicious Model." 電腦學刊 35, no. 1 (2024): 065–81. http://dx.doi.org/10.53106/199115992024023501005.
Texto completoWang, Hong, and Shi Min Wei. "Secure Distributed Computation in the Exponent." Advanced Materials Research 217-218 (March 2011): 994–1000. http://dx.doi.org/10.4028/www.scientific.net/amr.217-218.994.
Texto completoSeo, Minhye. "Fair and Secure Multi-Party Computation with Cheater Detection." Cryptography 5, no. 3 (2021): 19. http://dx.doi.org/10.3390/cryptography5030019.
Texto completoZhi-Gang, Gan. "Improvement of Quantum Protocols for Secure Multi-Party Summation." International Journal of Theoretical Physics 59, no. 10 (2020): 3086–92. http://dx.doi.org/10.1007/s10773-020-04555-5.
Texto completoAlghamdi, Wajdi, Reda Salama, M. Sirija, Ahmed Radie Abbas, and Kholmurodova Dilnoza. "Secure Multi-Party Computation for Collaborative Data Analysis." E3S Web of Conferences 399 (2023): 04034. http://dx.doi.org/10.1051/e3sconf/202339904034.
Texto completoFeng, Dengguo, and Kang Yang. "Concretely efficient secure multi-party computation protocols: survey and more." Security and Safety 1 (2022): 2021001. http://dx.doi.org/10.1051/sands/2021001.
Texto completoBraun, Lennart, Daniel Demmler, Thomas Schneider, and Oleksandr Tkachenko. "MOTION – A Framework for Mixed-Protocol Multi-Party Computation." ACM Transactions on Privacy and Security 25, no. 2 (2022): 1–35. http://dx.doi.org/10.1145/3490390.
Texto completoChen, Chang, Guoyu Yang, Zhihao Li, Fuan Xiao, Qi Chen, and Jin Li. "Privacy-Preserving Multi-Party Cross-Chain Transaction Protocols." Cryptography 8, no. 1 (2024): 6. http://dx.doi.org/10.3390/cryptography8010006.
Texto completoZheng, Qiang, Shou Shan Luo, and Yang Xin. "Research on the Secure Multi-Party Computation of some Linear Algebra Problems." Applied Mechanics and Materials 20-23 (January 2010): 265–70. http://dx.doi.org/10.4028/www.scientific.net/amm.20-23.265.
Texto completoKumari, Surabhi. "Efficient and Secure Multi-party Computation for Heterogeneous Environment." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 911–17. http://dx.doi.org/10.22214/ijraset.2021.38932.
Texto completoVijaya Kumar, A., N. J.V.Vineetha, P. Sai Chakradar, and K. Kalyan Sai. "Enhancement of security in cloud computing with secure multi-party computation." International Journal of Engineering & Technology 7, no. 1.1 (2017): 339. http://dx.doi.org/10.14419/ijet.v7i1.1.9848.
Texto completoXie, Dong Qing, and Chun Ming Tang. "Electronic Protocols for Voting and Bidding Based on Secure Multi-Party Proof." Advanced Materials Research 171-172 (December 2010): 305–10. http://dx.doi.org/10.4028/www.scientific.net/amr.171-172.305.
Texto completoYogi, Manas Kumar, and Yamuna Mundru. "Genomic Data Analysis with Variant of Secure Multi-Party Computation Technique." December 2023 5, no. 4 (2023): 450–70. http://dx.doi.org/10.36548/jtcsst.2023.4.006.
Texto completoCosta, Bruno, Pedro Branco, Manuel Goulão, Mariano Lemus, and Paulo Mateus. "Randomized Oblivious Transfer for Secure Multiparty Computation in the Quantum Setting." Entropy 23, no. 8 (2021): 1001. http://dx.doi.org/10.3390/e23081001.
Texto completoBroadnax, Brandon, Alexander Koch, Jeremias Mechler, Tobias Müller, Jörn Müller-Quade, and Matthias Nagel. "Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 312–38. http://dx.doi.org/10.2478/popets-2021-0072.
Texto completoLu, Donghang, Albert Yu, Aniket Kate, and Hemanta Maji. "Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (2021): 396–416. http://dx.doi.org/10.2478/popets-2022-0020.
Texto completoSaxena, Ashwin, Kishore Thapliyal, and Anirban Pathak. "Continuous variable controlled quantum dialogue and secure multiparty quantum computation." International Journal of Quantum Information 18, no. 04 (2020): 2050009. http://dx.doi.org/10.1142/s0219749920500094.
Texto completoRoy, Amit Kumar, Keshab Nath, Gautam Srivastava, Thippa Reddy Gadekallu, and Jerry Chun-Wei Lin. "Privacy Preserving Multi-Party Key Exchange Protocol for Wireless Mesh Networks." Sensors 22, no. 5 (2022): 1958. http://dx.doi.org/10.3390/s22051958.
Texto completoXin Liu, Xin Liu, Yang Xu Xin Liu, Gang Xu Yang Xu, Xiu-Bo Chen Gang Xu, and Yu-Ling Cheng Xiu-Bo Chen. "Secure Judgment of Point and Line Relationship Against Malicious Adversaries and Its Applications." 網際網路技術學刊 23, no. 5 (2022): 1019–27. http://dx.doi.org/10.53106/160792642022092305010.
Texto completoSheikhalishahi, Mina, Ischa Stork, and Nicola Zannone. "Privacy-preserving policy evaluation in multi-party access control." Journal of Computer Security 29, no. 6 (2021): 613–50. http://dx.doi.org/10.3233/jcs-200007.
Texto completoVijaya Kumar, A., and L. S. S. Reddy. "A critical review on application of secure multi party computation protocols in cloud environment." International Journal of Engineering & Technology 7, no. 2.7 (2018): 363. http://dx.doi.org/10.14419/ijet.v7i2.7.10720.
Texto completoLi, Zhihui, Xue Jiang, and Lu Liu. "Multi-Party Quantum Secret Sharing Based on GHZ State." Entropy 24, no. 10 (2022): 1433. http://dx.doi.org/10.3390/e24101433.
Texto completoBaum, Carsten, Daniel Escudero, Alberto Pedrouzo-Ulloa, Peter Scholl, and Juan Ramón Troncoso-Pastoriza. "Efficient protocols for oblivious linear function evaluation from ring-LWE1." Journal of Computer Security 30, no. 1 (2022): 39–78. http://dx.doi.org/10.3233/jcs-200116.
Texto completoWagh, Sameer. "Pika: Secure Computation using Function Secret Sharing over Rings." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 351–77. http://dx.doi.org/10.56553/popets-2022-0113.
Texto completoLiu, Xin, Xiaomeng Liu, Ruiling Zhang, Dan Luo, Gang Xu, and Xiubo Chen. "Securely Computing the Manhattan Distance under the Malicious Model and Its Applications." Applied Sciences 12, no. 22 (2022): 11705. http://dx.doi.org/10.3390/app122211705.
Texto completoHassan, Mohammad R., Feras A. Alnaimait, Qasem Kharma, Ashraf Sharah, and Khalil H. Al-Shqeerat. "Secure Group Key Management Protocol for Grid Computing." Webology 18, no. 2 (2021): 1055–65. http://dx.doi.org/10.14704/web/v18i2/web18374.
Texto completoRoche, Thomas, and Emmanuel Prouff. "Higher-order glitch free implementation of the AES using Secure Multi-Party Computation protocols." Journal of Cryptographic Engineering 2, no. 2 (2012): 111–27. http://dx.doi.org/10.1007/s13389-012-0033-3.
Texto completoBlanton, Marina, Dennis Murphy, and Chen Yuan. "Efficiently Compiling Secure Computation Protocols From Passive to Active Security: Beyond Arithmetic Circuits." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 74–97. http://dx.doi.org/10.56553/popets-2024-0006.
Texto completoHe, Guang Ping. "An Optical Implementation of Quantum Bit Commitment Using Infinite-Dimensional Systems." Applied Sciences 13, no. 13 (2023): 7692. http://dx.doi.org/10.3390/app13137692.
Texto completoLi, Lei, and Zhi Li. "An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure." Entropy 25, no. 2 (2023): 265. http://dx.doi.org/10.3390/e25020265.
Texto completoCui, Jianming, Xiaojun Zhang, Ning Cao, Dexue Zhang, Jianrui Ding, and Guofu Li. "An improved authentication protocol–based dynamic identity for multi-server environments." International Journal of Distributed Sensor Networks 14, no. 5 (2018): 155014771877765. http://dx.doi.org/10.1177/1550147718777654.
Texto completoEdemacu, Kennedy, and Jong Wook Kim. "Scalable Multi-Party Privacy-Preserving Gradient Tree Boosting over Vertically Partitioned Dataset with Outsourced Computations." Mathematics 10, no. 13 (2022): 2185. http://dx.doi.org/10.3390/math10132185.
Texto completoSchoppmann, Phillipp, Lennart Vogelsang, Adrià Gascón, and Borja Balle. "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 209–29. http://dx.doi.org/10.2478/popets-2020-0024.
Texto completoMishra, Abhishek. "Privacy-Preserving Data Sharing Platform." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem32225.
Texto completoTrieu Quang Phong. "Constructing efficient and secure batch signature schemes." Journal of Military Science and Technology, CSCE5 (December 15, 2021): 49–60. http://dx.doi.org/10.54939/1859-1043.j.mst.csce5.2021.49-60.
Texto completoAttrapadung, Nuttapong, Koki Hamada, Dai Ikarashi, et al. "Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 746–67. http://dx.doi.org/10.56553/popets-2022-0131.
Texto completoFan, Cunqun, Peiheng Jia, Manyun Lin, et al. "Cloud-Assisted Private Set Intersection via Multi-Key Fully Homomorphic Encryption." Mathematics 11, no. 8 (2023): 1784. http://dx.doi.org/10.3390/math11081784.
Texto completoDemmler, Daniel. "Towards practical privacy-preserving protocols." it - Information Technology 64, no. 1-2 (2022): 49–53. http://dx.doi.org/10.1515/itit-2022-0005.
Texto completoC.Kanmani Pappa. "Zero-Trust Cryptographic Protocols and Differential Privacy Techniques for Scalable Secure Multi-Party Computation in Big Data Analytics." Journal of Electrical Systems 20, no. 5s (2024): 2114–23. http://dx.doi.org/10.52783/jes.2550.
Texto completoMd Fahim Ahammed and Md Rasheduzzaman Labu. "Privacy-Preserving Data Sharing in Healthcare: Advances in Secure Multiparty Computation." Journal of Medical and Health Studies 5, no. 2 (2024): 37–47. http://dx.doi.org/10.32996/jmhs.2024.5.2.4.
Texto completo