نتایج جستجو برای: secure computation

تعداد نتایج: 196509  

2011
Yan Huang Peter Chapman David Evans

Secure two-party computation has been an interesting theoretical concept for decades, but until recently has been considered too expensive for practical applications. With significant advances in the design and implementation of secure protocols, secure computation is becoming feasible in practice. However, with the notable exceptions of biometric identification and secure auctions, the researc...

Journal: :IEEE journal on selected areas in information theory 2021

We discuss secure transmission via an untrusted relay when we have a multiple access phase from two nodes to the and broadcast nodes. To realize security, construct code that securely transmits modulo sum of messages channel. In this code, cannot obtain any information with respect message each node, can decode only modulo-sum Our is constructed by simple combination existing linear universal2 ...

Journal: :EURASIP Journal on Information Security 2007

Journal: :The Journal of Korea Information and Communications Society 2014

Journal: :Wireless Communications and Mobile Computing 2023

The wireless network suffers from many security problems, and computation in a environment may fail to preserve privacy as well correctness when the adversaries conduct attacks through backdoors, steganography, kleptography, etc. Secure ensures execution such an environment, compared with on plaintext, performance of secure is bounded by underlying cryptographic algorithms between involved part...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید