00847nam a2200229 i 450099100179370970753620020503153649.0930719s1988 be ||| | fre 2907440039b10273694-39ule_instEXGIL91594ExLBiblioteca InterfacoltàitaCompère, Gaston439946Anne de Chantraine ou la naissance d'une ombre /Gaston CompèreMarolles en Brie :Kupczyk,c1988236 p. ;21 cm..b1027369402-04-1427-06-02991001793709707536LE002 Fr. VIII F 1212002000970909le002-E0.00-l- 00000.i1032562127-06-02Anne de Chantraine ou la naissance d'une ombre210672UNISALENTOle00201-01-93ma -frebe 0101756nam 2200385 450 99657486100331620231213215802.01-5044-7986-610.1109/IEEESTD.2021.9604029(CKB)4100000012108942(NjHacI)994100000012108942(EXLCZ)99410000001210894220231213d2021 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrier2842-2021 IEEE Recommended Practice for Secure Multi-Party Computation /Institute of Electrical and Electronics EngineersNew York, NY, USA :IEEE,2021.1 online resource (30 pages)Data has become one of the most important assets in ICT area. Secure multi-party computation plays a very important role in balancing data usage and data protection. It could build trust and security in data collaboration and big data analysis related areas. A technical framework for secure multi-party computation is provided in this standard, including specifying the following: an overview of secure multi-party computation; a technical framework of secure multi-party computation; security levels of secure multi-party computation; and use cases based on secure multi-party computation.Data encryption (Computer science)Computer securityManagementCryptographyData encryption (Computer science)Computer securityManagement.Cryptography.005.82NjHacINjHaclDOCUMENT9965748610033162842-20213651220UNISA