Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm.
We generate and gather a lot of data about ourselves and others, some of it highly confidential. The collection, storage and use of this data is strictly regulated by laws, but restricting the use of data often limits the benefits which could be obtained from its analysis. Secure multi-party computa...
Saved in:
Online Access: |
Full Text (via ProQuest) |
---|---|
Other Authors: | , |
Format: | eBook |
Language: | English |
Published: |
Amsterdam :
IOS Press,
2015.
|
Series: | Cryptology and information security series ;
volume 13. |
Subjects: |
Internet
Full Text (via ProQuest)Online
Call Number: |
QA76.9.A25
|
---|---|
QA76.9.A25 | Available |