-
1
Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
Published 2024-12-01“…Blockchain wallets are essential interfaces for managing digital assets and authorising transactions within blockchain systems. However, typical blockchain wallets often encounter performance, privacy and cost issues when utilising multi-signature schemes and face security vulnerabilities with single-signature methods. …”
Get full text
Article -
2
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01“…This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. …”
Get full text
Article -
3
Harnessing the potential of shared data in a secure, inclusive, and resilient manner via multi-key homomorphic encryption
Published 2024-06-01Subjects: “…Adaptive machine learning systems…”
Get full text
Article -
4
Double layer federated security learning architecture for artificial intelligence of things
Published 2024-12-01“…The entire security learning system was divided into a two-level architecture of bottom and top layers. …”
Get full text
Article -
5
Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks
Published 2025-01-01“…This research promotes a shift toward distributed and real-time technologies, including blockchain and secure multi-party computation, to enhance communication integrity and privacy, ultimately strengthening system resilience by eliminating single points of failure. …”
Get full text
Article -
6
The One-Gate Management System And Temple Conservation: A Comparative Study Of Borobudur And Angkor Wat Temples
Published 2024-12-01“…The findings reveal that the management of Borobudur Temple has undergone significant transformation, shifting from multi-party management to a single-gate system in 2024 under InJourney Destination Management (IDM). …”
Get full text
Article -
7
EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks
Published 2024-12-01“…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
Get full text
Article -
8
Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs
Published 2025-01-01“…CanDID by Maram et al. proposed that decentralized digital identity systems may achieve Sybil-resistance and preserve privacy by utilizing multi-party computation (MPC), assuming a distributed committee of trusted nodes. …”
Get full text
Article -
9
Secure computation protocol of Chebyshev distance under the malicious model
Published 2024-07-01“…Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. …”
Get full text
Article -
10
Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning
Published 2025-01-01“…In this context, Autonomous Systems (ASs) form a multi-domain network where routing tasks are delegated to an SDN controller. …”
Get full text
Article