咨询与建议

限定检索结果

文献类型

  • 2 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 2 篇 电气工程
    • 1 篇 软件工程

主题

  • 3 篇 secure computati...
  • 2 篇 cryptographic pr...
  • 1 篇 experimentation
  • 1 篇 lbs
  • 1 篇 privacy-preservi...
  • 1 篇 mobile devices
  • 1 篇 location-based s...
  • 1 篇 location proximi...
  • 1 篇 single fixed fun...
  • 1 篇 deployment
  • 1 篇 fully resettable...
  • 1 篇 ss-rs-rzk
  • 1 篇 polygon range qu...
  • 1 篇 computational mo...
  • 1 篇 business applica...
  • 1 篇 pplp computation...
  • 1 篇 protocols
  • 1 篇 polynomials
  • 1 篇 circles
  • 1 篇 telecommunicatio...

机构

  • 1 篇 chongqing univ t...
  • 1 篇 department of co...
  • 1 篇 univ helsinki de...
  • 1 篇 google inc mount...
  • 1 篇 columbia univ ny...
  • 1 篇 tech univ darmst...
  • 1 篇 microsoft resear...

作者

  • 1 篇 schneider thomas
  • 1 篇 yung moti
  • 1 篇 yang zheng
  • 1 篇 maji hemanta k.
  • 1 篇 jarvinen kimmo
  • 1 篇 tkachenko oleksa...
  • 1 篇 goyal vipul
  • 1 篇 kiss agnes

语言

  • 3 篇 英文
检索条件"主题词=secure computation protocols"
3 条 记 录,以下是1-10 订阅
排序:
From Mental Poker to Core Business: Why and How to Deploy secure computation protocols?  15
From Mental Poker to Core Business: Why and How to Deploy Se...
收藏 引用
22nd ACM SIGSAC Conference on Computer and Communications Security (CCS)
作者: Yung, Moti Google Inc Mountain View CA 94043 USA Columbia Univ New York NY 10027 USA
Technological innovations in security and privacy are critical to advancing modern computing in our time. I will present an effort involving deployment of experimental commercial applications designed and built as a &... 详细信息
来源: 评论
Faster privacy-preserving location proximity schemes for circles and polygons
收藏 引用
IET INFORMATION SECURITY 2020年 第3期14卷 254-265页
作者: Jarvinen, Kimmo Kiss, Agnes Schneider, Thomas Tkachenko, Oleksandr Yang, Zheng Univ Helsinki Dept Comp Sci Pietari Kalmin Katu 5 Helsinki Finland Tech Univ Darmstadt Dept Comp Sci Mornewegstr 32 Darmstadt Germany Chongqing Univ Technol Sch Comp Sci & Engn Hongguan Ave 69 Chongqing Peoples R China
In the last decade, location information became easily obtainable using off-the-shelf mobile devices. This gave momentum to developing location-based services (LBSs) such as location proximity detection, which can be ... 详细信息
来源: 评论
Stateless Cryptographic protocols
Stateless Cryptographic Protocols
收藏 引用
52nd Annual IEEE Symposium on Foundations of Computer Science (FOCS)
作者: Goyal, Vipul Maji, Hemanta K. Microsoft Research India Department of Computer Science University of Illinois Urbana-Champaign IL United States
secure computation protocols inherently involve multiple rounds of interaction among the parties where, typically a party has to keep a state about what has happened in the protocol so far and then wait for the other ... 详细信息
来源: 评论