Dynamic multi-party computation forever for swarm and cloud computing and code obfuscation

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Intuitive and Basic Description of Secure Multi-party Computation. Secure multi-party computation [1,3] schemes allow participants to calculate a function of their inputs, such that the inputs of the participants are not revealed to each other.

Original languageAmerican English
Title of host publicationAlgorithms for Sensor Systems - 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2011, Revised Selected Papers
Pages1-3
Number of pages3
DOIs
StatePublished - 27 Feb 2012
Event7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2011 - Saarbrucken, Germany
Duration: 8 Sep 20119 Sep 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7111 LNCS

Conference

Conference7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2011
Country/TerritoryGermany
CitySaarbrucken
Period8/09/119/09/11

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Dynamic multi-party computation forever for swarm and cloud computing and code obfuscation'. Together they form a unique fingerprint.

Cite this