£ 9.26 shipping from Germany to United Kingdom
Destination, rates & speedsSeller: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany
Buch. Condition: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authorspresent seminal possibility and feasibility results in this model and includes formalsecurity proofs. Even though the passive corruption model may seem very weak,achieving security against such a benign form of adversary turns out to be non-trivialand demands sophisticated and highly advanced techniques. MPC is a fundamentalconcept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their privateinputs to jointly and securely perform any computation on their inputs. Examples ofsuch computation include, but not limited to, privacy-preserving data mining; securee-auction; private set-intersection; and privacy-preserving machine learning. MPCprotocols emulate the role of an imaginary, centralized trusted third party (TTP) thatcollects the inputs of the parties, performs the desired computation, and publishes theresult. Due to its powerful abstraction, the MPC problem has been widely studied overthe last four decades. 248 pp. Englisch. Seller Inventory # 9783031121630
Quantity: 2 available
Seller: AHA-BUCH GmbH, Einbeck, Germany
Buch. Condition: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book focuses on multi-party computation (MPC) protocols in the passive corruption model (also known as the semi-honest or honest-but-curious model). The authorspresent seminal possibility and feasibility results in this model and includes formalsecurity proofs. Even though the passive corruption model may seem very weak,achieving security against such a benign form of adversary turns out to be non-trivialand demands sophisticated and highly advanced techniques. MPC is a fundamentalconcept, both in cryptography as well as distributed computing. On a very high level, an MPC protocol allows a set of mutually-distrusting parties with their privateinputs to jointly and securely perform any computation on their inputs. Examples ofsuch computation include, but not limited to, privacy-preserving data mining; securee-auction; private set-intersection; and privacy-preserving machine learning. MPCprotocols emulate the role of an imaginary, centralized trusted third party (TTP) thatcollects the inputs of the parties, performs the desired computation, and publishes theresult. Due to its powerful abstraction, the MPC problem has been widely studied overthe last four decades. Seller Inventory # 9783031121630
Quantity: 1 available
Seller: moluna, Greven, Germany
Gebunden. Condition: New. Seller Inventory # 628807128
Quantity: Over 20 available
Seller: Majestic Books, Hounslow, United Kingdom
Condition: New. Print on Demand. Seller Inventory # 401165763
Quantity: 4 available
Seller: Books Puddle, New York, NY, U.S.A.
Condition: New. 1st ed. 2022 edition NO-PA16APR2015-KAP. Seller Inventory # 26396292636
Quantity: 4 available
Seller: Biblios, Frankfurt am main, HESSE, Germany
Condition: New. PRINT ON DEMAND. Seller Inventory # 18396292630
Quantity: 4 available