top of page

Methods of Privacy-Preserving Computing

This course can no longer be booked.

This course will introduce different approaches to achieve privacy-preserving computing


Service Description

- Pillars of privacy-preserving computing - Introduction to Homomorphic Encryption - Analysis of Pros and Cons - Libraries of HE and usage examples - Introduction to Trusted Execution Environment - Analysis of Pros and Cons - Libraries of TEE and usage examples - Introduction to Secure Multi-Party Computation - Analysis of Pros and Cons - Libraries of SMPC and usage examples - Other approaches: Differential Privacy, Functional Encryption.


CONTACT US

Thank You!

Legal HQ - via Petrarca 80, Naples, IT.
Operational HQ - Centro Direzionale Isola E2, Naples, IT.
VAT: 09542241212
Email: info@trustup.it

FOLLOW US

  • Linkedin

© 2024 Trust Up. All Rights Reserved.

bottom of page