-
1
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
2
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01Subjects: “…data collaborative secure computing…”
Get full text
Article -
3
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01Subjects: Get full text
Article