Dynamic multi-party computation forever for swarm and cloud computing and code obfuscation

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Intuitive and Basic Description of Secure Multi-party Computation. Secure multi-party computation [1,3] schemes allow participants to calculate a function of their inputs, such that the inputs of the participants are not revealed to each other.

Original languageEnglish
Title of host publicationAlgorithms for Sensor Systems - 7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2011, Revised Selected Papers
Pages1-3
Number of pages3
DOIs
StatePublished - 27 Feb 2012
Event7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2011 - Saarbrucken, Germany
Duration: 8 Sep 20119 Sep 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7111 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference7th International Symposium on Algorithms for Sensor Systems, Wireless Ad Hoc Networks and Autonomous Mobile Entities, ALGOSENSORS 2011
Country/TerritoryGermany
CitySaarbrucken
Period8/09/119/09/11

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science (all)

Fingerprint

Dive into the research topics of 'Dynamic multi-party computation forever for swarm and cloud computing and code obfuscation'. Together they form a unique fingerprint.

Cite this