secure two-party computation
Developing a cloud-based secure computation platform for genomics research
88
Secure Multi-Party Computation and Privacy
167
Practical and Foundational Aspects of Secure Computation
144
HLLC-type Riemann solver with approximated two-phase contact for the computation of the Baer-Nunziato two-fluid model
39
Secure the Clones - Static Enforcement of Policies for Secure Object Copying
21
A Birthday Party Frame System
23
Subjective rating of party walls
13
Virtual Secure Mode: Initialization
11
Synthesising Secure APIs
28
Secure the Clones
31
Synthesizing secure protocols
36
Computation
9
Estimation of crack opening from a two-dimensional continuum-based finite element computation
19
Secure Joins with MapReduce
18
Implementation Software to Secure Virtual Machines with Remote Grid of Secure Elements
7
Computation Research
14
Computation Research
10
Computation Research
4
Computation Research
6
Computation Research
6