1 resultado para Contractual party
em University of Southampton, United Kingdom
Filtro por publicador
- JISC Information Environment Repository (1)
- Repository Napier (1)
- Aberdeen University (3)
- Aberystwyth University Repository - Reino Unido (2)
- Aquatic Commons (5)
- Archive of European Integration (155)
- Archivo Digital para la Docencia y la Investigación - Repositorio Institucional de la Universidad del País Vasco (1)
- Aston University Research Archive (31)
- Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (1)
- Biblioteca Digital de Teses e Dissertações Eletrônicas da UERJ (2)
- Bibloteca do Senado Federal do Brasil (7)
- BORIS: Bern Open Repository and Information System - Berna - Suiça (33)
- Brock University, Canada (5)
- Bucknell University Digital Commons - Pensilvania - USA (3)
- Cambridge University Engineering Department Publications Database (3)
- CentAUR: Central Archive University of Reading - UK (34)
- Center for Jewish History Digital Collections (13)
- Chapman University Digital Commons - CA - USA (4)
- Chinese Academy of Sciences Institutional Repositories Grid Portal (1)
- Comissão Econômica para a América Latina e o Caribe (CEPAL) (6)
- CORA - Cork Open Research Archive - University College Cork - Ireland (2)
- Corvinus Research Archive - The institutional repository for the Corvinus University of Budapest (1)
- CUNY Academic Works (1)
- Dalarna University College Electronic Archive (2)
- Deakin Research Online - Australia (42)
- DI-fusion - The institutional repository of Université Libre de Bruxelles (2)
- Digital Archives@Colby (3)
- Digital Commons at Florida International University (4)
- Digital Peer Publishing (3)
- DigitalCommons@The Texas Medical Center (2)
- Digitale Sammlungen - Goethe-Universität Frankfurt am Main (1)
- Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland (1)
- DRUM (Digital Repository at the University of Maryland) (2)
- Duke University (2)
- Gallica, Bibliotheque Numerique - Bibliothèque nationale de France (French National Library) (BnF), France (2)
- Greenwich Academic Literature Archive - UK (4)
- Harvard University (22)
- Helda - Digital Repository of University of Helsinki (5)
- Indian Institute of Science - Bangalore - Índia (1)
- Lume - Repositório Digital da Universidade Federal do Rio Grande do Sul (1)
- Ministerio de Cultura, Spain (4)
- Nottingham eTheses (1)
- QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast (86)
- Queensland University of Technology - ePrints Archive (89)
- RDBU - Repositório Digital da Biblioteca da Unisinos (1)
- Repositório digital da Fundação Getúlio Vargas - FGV (8)
- Repositorio Institucional de la Universidad de La Laguna (1)
- Repositório Institucional UNESP - Universidade Estadual Paulista "Julio de Mesquita Filho" (2)
- Repositorio Institucional Universidad Católica de Colombia (1)
- Repositorio Institucional Universidad de Medellín (1)
- RUN (Repositório da Universidade Nova de Lisboa) - FCT (Faculdade de Cienecias e Technologia), Universidade Nova de Lisboa (UNL), Portugal (1)
- SAPIENTIA - Universidade do Algarve - Portugal (1)
- SerWisS - Server für Wissenschaftliche Schriften der Fachhochschule Hannover (1)
- Universidad de Alicante (3)
- Universidad del Rosario, Colombia (13)
- Universidad Politécnica de Madrid (1)
- Universidade Federal do Rio Grande do Norte (UFRN) (1)
- Universitat de Girona, Spain (1)
- Universitätsbibliothek Kassel, Universität Kassel, Germany (1)
- Université de Lausanne, Switzerland (1)
- Université de Montréal (8)
- Université de Montréal, Canada (15)
- University of Canberra Research Repository - Australia (1)
- University of Connecticut - USA (1)
- University of Michigan (138)
- University of Queensland eSpace - Australia (7)
- University of Southampton, United Kingdom (1)
- WestminsterResearch - UK (10)
Resumo:
Speaker(s): Prof. David Evans Organiser: Dr Tim Chown Time: 22/05/2014 10:45-11:45 Location: B53/4025 Abstract Secure multi-party computation enables two (or more) participants to reliably compute a function that depends on both of their inputs, without revealing those inputs to the other party or needing to trust any other party. It could enable two people who meet at a conference to learn who they known in common without revealing any of their other contacts, or allow a pharmaceutical company to determine the correct dosage of a medication based on a patient’s genome without compromising the privacy of the patient. A general solution to this problem has been known since Yao's pioneering work in the 1980s, but only recently has it become conceivable to use this approach in practice. Over the past few years, my research group has worked towards making secure computation practical for real applications. In this talk, I'll provide a brief introduction to secure computation protocols, describe the techniques we have developed to design scalable and efficient protocols, and share some recent results on improving efficiency and how secure computing applications are developed.