Showing 1 - 10 results of 10 for search 'multi-party system', query time: 0.05s Refine Results
  1. 1

    Shared-Custodial Wallet for Multi-Party Crypto-Asset Management by Yimika Erinle, Yebo Feng, Jiahua Xu, Nikhil Vadgama, Paolo Tasca

    Published 2024-12-01
    “…Blockchain wallets are essential interfaces for managing digital assets and authorising transactions within blockchain systems. However, typical blockchain wallets often encounter performance, privacy and cost issues when utilising multi-signature schemes and face security vulnerabilities with single-signature methods. …”
    Get full text
    Article
  2. 2

    Review of privacy computing techniques for multi-party data fusion analysis by LIU Shenglong, HUANG Xiuli, JIANG Yiwen, JIANG Jiawei, TIAN Yuechi, ZHOU Zejun, NIU Ben

    Published 2024-12-01
    “…This work focused on the needs of multi-party privacy computing for cross-system exchanges in ubiquitous sharing environments, taking the security sharing and controlled dissemination of private data in multi-party data fusion applications as the starting point, and provided reviews of existing relevant work from the perspectives of multi-party privacy computing, multi-party privacy information sharing control, and multi-party data collaborative secure computing. …”
    Get full text
    Article
  3. 3
  4. 4

    Double layer federated security learning architecture for artificial intelligence of things by ZHENG Chengbo, YAN Haonan, FU Caili, ZHANG Dong, LI Hui, WANG Bin

    Published 2024-12-01
    “…The entire security learning system was divided into a two-level architecture of bottom and top layers. …”
    Get full text
    Article
  5. 5

    Enhancing Intelligent Transport Systems Through Decentralized Security Frameworks in Vehicle-to-Everything Networks by Usman Tariq, Tariq Ahamed Ahanger

    Published 2025-01-01
    “…This research promotes a shift toward distributed and real-time technologies, including blockchain and secure multi-party computation, to enhance communication integrity and privacy, ultimately strengthening system resilience by eliminating single points of failure. …”
    Get full text
    Article
  6. 6

    The One-Gate Management System And Temple Conservation: A Comparative Study Of Borobudur And Angkor Wat Temples by Ajie Wicaksono, Ebtana Sella Mayang Fitri, Tio Anggara, Sochenda Sum

    Published 2024-12-01
    “…The findings reveal that the management of Borobudur Temple has undergone significant transformation, shifting from multi-party management to a single-gate system in 2024 under InJourney Destination Management (IDM). …”
    Get full text
    Article
  7. 7

    EdgeGuard: Decentralized Medical Resource Orchestration via Blockchain-Secured Federated Learning in IoMT Networks by Sakshi Patni, Joohyung Lee

    Published 2024-12-01
    “…We also create an access control system based on smart contracts and a secure multi-party computing protocol for model updates. …”
    Get full text
    Article
  8. 8

    Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs by Koichi Moriyama, Akira Otsuka

    Published 2025-01-01
    “…CanDID by Maram et al. proposed that decentralized digital identity systems may achieve Sybil-resistance and preserve privacy by utilizing multi-party computation (MPC), assuming a distributed committee of trusted nodes. …”
    Get full text
    Article
  9. 9

    Secure computation protocol of Chebyshev distance under the malicious model by Xin Liu, Weitong Chen, Lu Peng, Dan Luo, Likai Jia, Gang Xu, Xiubo Chen, Xiaomeng Liu

    Published 2024-07-01
    “…Abstract Secure multi-party computation of Chebyshev distance represents a crucial method for confidential distance measurement, holding significant theoretical and practical implications. …”
    Get full text
    Article
  10. 10

    Scalable and Privacy-Preserving Inter-AS Routing Through Machine-Learning-Based Graph Pruning by Davide Andreoletti, Cristina Rottondi, Silvia Giordano, Andrea Bianco

    Published 2025-01-01
    “…In this context, Autonomous Systems (ASs) form a multi-domain network where routing tasks are delegated to an SDN controller. …”
    Get full text
    Article