نتایج جستجو برای: party action

تعداد نتایج: 642404  

Journal: :Contexts 2017

Journal: :The Bulletin of the Royal College of Surgeons of England 2010

Journal: :British Journalism Review 2015

2018
Patrick Ah-Fat Michael Huth

The purpose of Secure Multi-Party Computation is to enable protocol participants to compute a public function of their private inputs while keeping their inputs secret, without resorting to any trusted third party. However, opening the public output of such computations inevitably reveals some information about the private inputs. We propose a measure generalising both Rényi entropy and g-entro...

Journal: :علوم اجتماعی 0

based on a meta-theoretical analysis of voting, the present paper is an attempt to present a theoretical model encompassing all the possible aspects of voting in an election action system, proposing four sub-systems of voting as follows: economic voting, political voting, cultural voting and moral voting. having distinguished among these sub-systems, the writer describes the constitutive elemen...

2002
Louis Putterman

Trust in the New Economy by Avner Ben-Ner and Louis Putterman June 2002 Introduction What do trust and the economy have to do with each other? In a world of perfect and symmetric information, where all related economic actions are simultaneous and occur in one place, the economy runs in the familiar fashion of the perfectly competitive market. In such a world, trust among economic actors is not...

2014
Thomas Schneider Daniel Demmler

English In 2013, the Portable Circuit Format (PCF) project was started to improve the way circuits for secure computation can efficiently be built, stored and evaluated. Secure computation is a growing field of cryptography, especially in the last decade and allows two or more parties to jointly evaluate a common function over their inputs without the need to disclose any information but the fi...

2014
Chun-Te Chu Jaeyeon Jung Zicheng Liu Ratul Mahajan

-We present sTrack, a system that can track objects across distributed cameras without revealing any visual information to peering cameras except whether an object was seen by both parties. To achieve this challenging privacy goal, we build on recent advances in secure two-party computation and multi-camera object tracking. Starting from two distance-metric learning techniques that are foundati...

2013
TOOMAS KRIPS Helger Lipmaa

1.1. Secure Two-Party Computation. In essence, secure multiparty computation is the solution to the problem how to compute on private inputs from several parties when we do not trust other parties and we don’t have a central authority who can get inputs, perform computations and give outputs to those that need them. Here we will talk about secure twoparty computation, where Alice, holding xa an...

2013
Yuzhe Tang Ling Liu Arun Iyengar

In information sharing networks, having a privacy preserving index (or PPI) is critically important for providing efficient search on access controlled content across distributed providers while preserving privacy. An understudied problem for PPI techniques is how to provide controllable privacy preservation, given the innate difference of privacy of the different content and providers. In this...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید