-
1
-
2
Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
Published 2024-12-01Subjects: Get full text
Article -
3
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. …”
Get full text
Article -
4
Data Visualization Model for Multi-party Analysis and Strategic Decision-Making in International Trade
Published 2025-01-01Subjects: Get full text
Article -
5
Syntactic and Prosodic Forms of First Names in Institutional Interaction Involving Multiple Participants
Published 2013-12-01Subjects: Get full text
Article -
6
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01Subjects: Get full text
Article -
7
Reconstituting public service broadcasting
Published 2022-11-01Subjects: “…apartheid to multi-party…”
Get full text
Article -
8
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01Subjects: Get full text
Article -
9
Private feasible solution determination
Published 2021-01-01“…Abstract Applying secure multi‐party computation (SMC) to implement secure linear programming is an important problem of SMC. …”
Get full text
Article -
10
Symposium on the role of religious leaders in peacemaking and social change in Africa: Zambia's case
Published 1994-12-01“…The transition from a single to multi-party democracy was peaceful following the free and fair elections. …”
Get full text
Article -
11
An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing
Published 2021-01-01“…Abstract Secret sharing is a cryptographic technique used in many different applications such as cloud computing, multi‐party computation and electronic voting. Security concerns in these applications are data privacy, availability, integrity and verifiability, where secret sharing provides proper solutions. …”
Get full text
Article -
12
Secure computation protocol of Chebyshev distance under the malicious model
Published 2024-07-01“…Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. …”
Get full text
Article -
13
The One-Gate Management System And Temple Conservation: A Comparative Study Of Borobudur And Angkor Wat Temples
Published 2024-12-01“…The findings reveal that the management of Borobudur Temple has undergone significant transformation, shifting from multi-party management to a single-gate system in 2024 under InJourney Destination Management (IDM). …”
Get full text
Article -
14
Management of inclusive data for Merapi volcano eruption risk areas using participatory action research (PAR) with the perspective of women, the elderly, and persons with disabilit...
Published 2025-01-01“…Data analysis was done through triangulation, utilizing multi-party meetings to verify findings based on various times, places, and participants. …”
Get full text
Article -
15
STATE RESPONSIBILITY IN FULFILLING TOURIST HEALTH RIGHTS IN DIVING TOURISM AT BUNAKEN NATIONAL PARK POST-COVID-19
Published 2024-12-01“…To better facilitate state responsibility in implementing the CHSE Protocol, this study proposes four government policies to support diving operators in Bunaken National Park: (1) providing subsidies and incentives, (2) offering training and education, (3) enforcing strict oversight and transparency, and (4) fostering multi-party cooperation. These policies aim to enhance compliance with the CHSE Protocol, ensuring the safety and health of tourists and preserving the environment. …”
Get full text
Article -
16
Multi-key fully homomorphic encryption scheme based on NTRU bootstrapping
Published 2024-12-01“…Multi-key fully homomorphic encryption (MK-FHE) technology supports homomorphic operations on ciphertexts encrypted with different keys, and can be directly applied to real-world multi-user data fusion computing scenarios, such as multi-party collaborative computing and federated learning. …”
Get full text
Article -
17
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. EdgeGuard outperforms existing solutions in terms of computational performance, data value, and privacy protection across a wide range of real-world medical datasets. …”
Get full text
Article -
18
Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks
Published 2025-01-01“…This research promotes a shift toward distributed and real-time technologies, including blockchain and secure multi-party computation, to enhance communication integrity and privacy, ultimately strengthening system resilience by eliminating single points of failure. …”
Get full text
Article -
19
Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning
Published 2025-01-01“…These protocols are based on Multi-Party Computation (MPC) schemes, which guarantee privacy at the cost of high computational and communication complexity, thus limiting scalability. …”
Get full text
Article -
20
Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs
Published 2025-01-01“…CanDID by Maram et al. proposed that decentralized digital identity systems may achieve Sybil-resistance and preserve privacy by utilizing multi-party computation (MPC), assuming a distributed committee of trusted nodes. …”
Get full text
Article