Search

Your search keyword '"Bogdanov, Dan"' showing total 93 results

Search Constraints

Start Over You searched for: Author "Bogdanov, Dan" Remove constraint Author: "Bogdanov, Dan"
93 results on '"Bogdanov, Dan"'

Search Results

2. UN Handbook on Privacy-Preserving Computation Techniques

3. Blueprints for Deploying Privacy Enhancing Technologies in E-Government

4. ZK-SecreC: a Domain-Specific Language for Zero Knowledge Proofs

5. Towards a common performance and effectiveness terminology for digital proximity tracing applications

7. PE-BPMN: Privacy-Enhanced Business Process Model and Notation

8. Deploying Decentralized, Privacy-Preserving Proximity Tracing.

9. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation

10. A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection

11. A Practical Analysis of Oblivious Sorting Algorithms for Secure Multi-party Computation

12. Privacy-Preserving Statistical Data Analysis on Federated Databases

13. Deploying Secure Multi-Party Computation for Financial Data Analysis : (Short Paper)

14. A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data Mining

15. VirtualLife: Secure Identity Management in Peer-to-Peer Systems

16. Sharemind: A Framework for Fast Privacy-Preserving Computations

23. Toward a Common Performance and Effectiveness Terminology for Digital Proximity Tracing Applications

28. From Keys to Databases:Real-World Applications of Secure Multi-Party Computation

34. Sharemind: programmeeritav turvaline arvutussüsteem praktiliste rakendustega

36. Octree-based Space Models and Their Use in Solving Path Finding Problems

41. A feasibility analysis of secure multiparty computation deployments

42. VirtualLife : Secure Identity Management in Peer-to-Peer Systems

43. An Improved Type System for a Privacy-aware Programming Language and its Practical Applications

44. A Comprehensive Protocol Suite for Secure Two-Party Computation

45. Turvalise ühisarvutuse rakendamine

46. The Analysis and Design of a Privacy-Preserving Survey System

47. Secure Multi-party Computation Protocols from a High-Level Programming Language

48. A Secure Multi-Party Computation Protocol Suite Inspired by Shamir's Secret Sharing Scheme

49. Actively Secure Two-Party Computation: Efficient Beaver Triple Generation

50. A Feasibility Analysis of Secure Multiparty Computation Deployments

Catalog

Books, media, physical & digital resources