搜索结果: 1-5 共查到“军事学 Data analysis”相关记录5条 . 查询时间(0.187 秒)
Secure multi-party data analysis: end user validation and practical experiments
secure multi-party computation end-user validation privacy preserving statistical analysis
2014/3/5
Research papers on new secure multi-party computation protocols rarely confirm the need for the developed protocol with its end users. One challenge in the way of such validation is that it is hard to...
Deploying secure multi-party computation for financial data analysis
applications / financial data analysis privacy-preserving data mining secure multi-party computation
2012/8/28
In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, we use secret sharing and secu...
Deploying secure multi-party computation for financial data analysis
applications / financial data analysis privacy-preserving data mining secure multi-party computation
2012/3/20
In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, we use secret sharing and secu...
Deploying secure multi-party computation for financial data analysis
financial data analysis privacy-preserving data mining secure multi-party computation
2012/6/14
In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, we use secret sharing and secu...
Deploying secure multi-party computation for financial data analysis
applications / financial data analysis privacy-preserving data mining secure multi-party computation
2012/8/28
In this paper we describe a secure system for jointly collecting and analyzing financial data for a consortium of ICT companies. To guarantee each participant's privacy, we use secret sharing and secu...