搜索结果: 1-2 共查到“知识库 军事学 e-business”相关记录2条 . 查询时间(0.203 秒)
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications
secure computation private intersection-sum secure aggregate ad conversion
2019/6/19
In this work, we describe how to deploy a cryptographic secure computation protocol for routine use in industry. Based on our experience, we identify major preliminaries and enabling factors which we ...
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Security intelligence Threat analytics Business intelligence
2015/12/24
This work defines the security intelligence of a system based on secure
multi-party computation in terms of correctness, fairness, rationality, trust,
honesty, transparency, accountability, reliabil...