Showing 1 - 20 results of 20 for search '"multi-party"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. …”
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7

    Reconstituting public service broadcasting by Ruth Teer-Tomaselli, Keyan Tomaselli

    Published 2022-11-01
    Subjects: “…apartheid to multi-party…”
    Get full text
    Article
  8. 8
  9. 9

    Private feasible solution determination by Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang

    Published 2021-01-01
    “…Abstract Applying secure multi‐party computation (SMC) to implement secure linear programming is an important problem of SMC. …”
    Get full text
    Article
  10. 10

    Symposium on the role of religious leaders in peacemaking and social change in Africa: Zambia's case by F.D. Sakala

    Published 1994-12-01
    “…The transition from a single to multi-party democracy was peaceful following the free and fair elections. …”
    Get full text
    Article
  11. 11

    An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing by Hossein Pilaram, Taraneh Eghlidos, Rahim Toluee

    Published 2021-01-01
    “…Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. …”
    Get full text
    Article
  12. 12

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. …”
    Get full text
    Article
  13. 13

    The One-Gate Management System And Temple Conservation: A Comparative Study Of Borobudur And Angkor Wat Temples by Ajie Wicaksono, Ebtana Sella Mayang Fitri, Tio Anggara, Sochenda Sum

    Published 2024-12-01
    “…The findings reveal that the management of Borobudur Temple has undergone significant transformation, shifting from multi-party management to a single-gate system in 2024 under InJourney Destination Management (IDM). …”
    Get full text
    Article
  14. 14

    Management of inclusive data for Merapi volcano eruption risk areas using participatory action research (PAR) with the perspective of women, the elderly, and persons with disabilit... by Meilinarti, Swasto Eko, Ngurah Ida, Candraningrum Dewi, Bening Rahmayna Kania

    Published 2025-01-01
    “…Data analysis was done through triangulation, utilizing multi-party meetings to verify findings based on various times, places, and participants. …”
    Get full text
    Article
  15. 15

    STATE RESPONSIBILITY IN FULFILLING TOURIST HEALTH RIGHTS IN DIVING TOURISM AT BUNAKEN NATIONAL PARK POST-COVID-19 by Х. Рияд, Р. Сьяфаат, И. Коесвахионо, Д. Пуспитавати

    Published 2024-12-01
    “…To better facilitate state responsibility in implementing the CHSE Protocol, this study proposes four government policies to support diving operators in Bunaken National Park: (1) providing subsidies and incentives, (2) offering training and education, (3) enforcing strict oversight and transparency, and (4) fostering multi-party cooperation. These policies aim to enhance compliance with the CHSE Protocol, ensuring the safety and health of tourists and preserving the environment. …”
    Get full text
    Article
  16. 16

    Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping by ZHENG Junhua, JIANG Hongwei, LIU Rong, LI Yixiu, LI Wen, WENG Jian

    Published 2024-12-01
    “…Multi-key fully homomorphic encryption (MK-FHE) technology supports homomorphic operations on ciphertexts encrypted with different keys, and can be directly applied to real-world multi-user data fusion computing scenarios, such as multi-party collaborative computing and federated learning. …”
    Get full text
    Article
  17. 17

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. EdgeGuard outperforms existing solutions in terms of computational performance, data value, and privacy protection across a wide range of real-world medical datasets. …”
    Get full text
    Article
  18. 18

    Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-01-01
    “…This research promotes a shift toward distributed and real-time technologies, including blockchain and secure multi-party computation, to enhance communication integrity and privacy, ultimately strengthening system resilience by eliminating single points of failure. …”
    Get full text
    Article
  19. 19

    Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning by Davide Andreoletti, Cristina Rottondi, Silvia Giordano, Andrea Bianco

    Published 2025-01-01
    “…These protocols are based on Multi-Party Computation (MPC) schemes, which guarantee privacy at the cost of high computational and communication complexity, thus limiting scalability. …”
    Get full text
    Article
  20. 20

    Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs by Koichi Moriyama, Akira Otsuka

    Published 2025-01-01
    “…CanDID by Maram et al. proposed that decentralized digital identity systems may achieve Sybil-resistance and preserve privacy by utilizing multi-party computation (MPC), assuming a distributed committee of trusted nodes. …”
    Get full text
    Article