نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

2012
J. C. Mitchell R. Sharma D. Stefan J. Zimmerman

Using homomorphic encryption and secure multiparty computation, cloud servers may perform regularly structured computation on encrypted data, without access to decryption keys. However, prior approaches for programming on encrypted data involve restrictive models such as boolean circuits, or standard languages that do not guarantee secure execution of all expressible programs. We present an exp...

Journal: :Advanced photonics 2023

Quantum state sharing, an important protocol in quantum information, can enable secure distribution and reconstruction when part of the information is lost. In (k, n) threshold secret encoded into n shares then distributed to players. The be reconstructed by any k players (k > / 2), while rest get nothing. continuous variable regime, implementation sharing needs feedforward technique, which inv...

Journal: :International Journal of Computer Theory and Engineering 2014

Journal: :Theoretical Computer Science 2010

Journal: :Facta Universitatis, Series: Automatic Control and Robotics 2018

Journal: :Electronic Commerce Research and Applications 2015
Lidia Ogiela

This publication presents new classes of financial management systems. These systems will serve as examples of systems for the cognitive analysis of financial data with particular emphasis on analysing financial ratios. Semantic analysis will be an innovative component in financial management systems which will enhance the traditional solutions by adding elements of cognitive data interpretatio...

Journal: :Journal of Computer Security 2005

Journal: :Decision Support Systems 2006
Rathindra Sarathy Krishnamurty Muralidhar

Data sharing among organizations, both government and business, has increased with the advent of the Internet. The study is motivated by the need to address increased confidentiality and privacy concerns that arise with the use of the Internet, while realizing the benefits of data sharing. In this study, we develop a research issues framework based on a survey of existing literature. The framew...

‎In a (t,n)-threshold secret sharing scheme‎, ‎a secret s is distributed among n participants such that any group of t or more participants can reconstruct the secret together‎, ‎but no group of fewer than t participants can do‎. In this paper, we propose a verifiable (t,n)-threshold multi-secret sharing scheme based on Shao and Cao‎, ‎and the intractability of the elliptic curve discrete logar...

Journal: :Information and Computation 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید