Tag

privacy-preserving computation

0 views collected around this technical thread.

AntTech
AntTech
Sep 26, 2024 · Information Security

Hangzhou Launches China’s First Secret Computing Center to Secure Data Lifecycle and Enable Trusted Data Services

On September 25, Hangzhou announced the nation’s first secret‑computing center, offering end‑to‑end encrypted data storage, processing, and exchange to protect privacy while unlocking the value of big‑data across finance, healthcare, urban governance, commerce, and agriculture.

Big DataData EcosystemData Security
0 likes · 6 min read
Hangzhou Launches China’s First Secret Computing Center to Secure Data Lifecycle and Enable Trusted Data Services
Baidu Geek Talk
Baidu Geek Talk
Jan 9, 2023 · Information Security

Diffie‑Hellman Key Agreement: Theory, Formula Derivation, and Java/Android Implementation

The article explains Diffie‑Hellman key agreement, detailing its 1976 origin, mathematical derivation, example walkthrough, and provides complete Java server and Android client code illustrating how two parties securely generate a shared secret over an insecure channel without transmitting the key.

AndroidDiffie-HellmanJava
0 likes · 10 min read
Diffie‑Hellman Key Agreement: Theory, Formula Derivation, and Java/Android Implementation