„secure computation“
Suchergebnisse
1.000+ Treffer
-
Advancing clinical research by semantically interconnecting aggregated medical data information in a secure context
-
Automated design, verification and testing of secure systems with embedded devices based on elicitation of expert knowledge
-
A brief survey on secure multi-party computing in the presence of rational parties
-
Off-line enterprise rights management leveraging biometric key binding and secure hardware
-
Secure system based on UAV and BLE for improving SAR missions
-
Can Apple build a privacy minded iPhone security system so secure that Apple cannot access it?
-
A secure group-based mobile chat protocol
-
Universally Composable Almost-Everywhere Secure Computation
-
EWOSCA: an enhanced walrus optimizer-based secure clustering approach for IoT-based WSNs under adversarial contexts
-
Modern Cryptography – From RSA to Zero-Knowledge and Beyond
-
Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography
-
On the Tightness of Forward-Secure Signature Reductions
-
A secure and robust color image watermarking using nature-inspired intelligence
-
Secure and effective authentication for 5G networks (SEA-5G) using blockchain
-
Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems
-
Computation and communication efficient secure group key exchange protocol for low configuration system
-
Completeness in Two-Party Secure Computation: A Computational View
-
Polynomial based non-interactive session key computation protocol for secure communication in dynamic groups
-
ANFISmark: ANFIS-based secure watermarking approach for telemedicine applications
-
SRF2T-ID: an implementation of ensemble learning-based IDS with wireless of things secure communication for smart residency environment