搜索结果: 1-2 共查到“军事学 E-Business”相关记录2条 . 查询时间(0.265 秒)
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications
secure computation private intersection-sum secure aggregate ad conversion
font style='font-size:12px;'>
2019/6/19
In this work, we describe how to deploy a cryptographic secure computation protocol for routine use in industry. Based on our experience, we identify major preliminaries and enabling factors which we ...
SECURE MULTI-PARTY COMPUTATION: HOW TO SOLVE THE CONFLICT BETWEEN SECURITY & BUSINESS INTELLIGENCE
Security intelligence Threat analytics Business intelligence
font style='font-size:12px;'>
2015/12/24
This work defines the security intelligence of a system based on secure
multi-party computation in terms of correctness, fairness, rationality, trust,
honesty, transparency, accountability, reliabil...