BEGIN:VCALENDAR
VERSION:2.0
PRODID:ILLC Website
X-WR-TIMEZONE:Europe/Amsterdam
BEGIN:VTIMEZONE
TZID:Europe/Amsterdam
X-LIC-LOCATION:Europe/Amsterdam
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:19700329T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=-1SU
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:19701025T030000
RRULE:FREQ=YEARLY;BYMONTH=10;BYDAY=-1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:/NewsandEvents/Archives/2012/newsitem/4392/4-8
-June-2012-Theory-and-Practice-of-Multiparty-Compu
tation-Aarhus-Denmark
DTSTAMP:20120315T000000
SUMMARY:Theory and Practice of Multiparty Computat
ion, Aarhus, Denmark
DTSTART;VALUE=DATE:20120604
DTEND;VALUE=DATE:20120608
LOCATION:Aarhus, Denmark
DESCRIPTION:Secure Multiparty Computation is a pow
erful cryptographic notion that - in theory - can
solve virtually any cryptographic protocol problem
. In recent years the technology has been used in
practice and holds great promise for future applic
ations. MPC technology can be used to implement, f
or instance, voting, auctions, procurement and ben
chmarking with better security, in particular with
out anyone having to reveal his private data to an
yone else. This workshop brings together people
in both theory and practice of the field, and we a
re convinced that this will prove very productive.
The first day will be dedicated for tutorials tha
t cover the basic definitions, constructions and b
uilding blocks. In the rest of the workshop, leadi
ng researchers in the field will present their lat
est results in secure computation. 22 invited spea
kers have confirmed participation. For more infor
mation, see http://cfem.au.dk/events/theory-and-pr
actice-of-multiparty-computation/
X-ALT-DESC;FMTTYPE=text/html:\n Secure M
ultiparty Computation is a powerful cryptographic\
n notion that - in theory - can solve virtu
ally any\n cryptographic protocol problem.
In recent years the technology\n has been u
sed in practice and holds great promise for future
\n applications. MPC technology can be use
d to implement, for\n instance, voting, auc
tions, procurement and benchmarking with\n
better security, in particular without anyone havi
ng to reveal\n his private data to anyone e
lse.

\n \n This workshop bring
s together people in both theory and\n prac
tice of the field, and we are convinced that this
will\n prove very productive. The first day
will be dedicated for\n tutorials that cov
er the basic definitions, constructions and\n
building blocks. In the rest of the workshop, l
eading\n researchers in the field will pres
ent their latest results in\n secure comput
ation. 22 invited speakers have confirmed\n
participation.

\n \n For more inf
ormation, see http://cfem.au.dk/events/theory-and-pr
actice-of-multiparty-computation/

\n
URL:/NewsandEvents/Archives/2012/newsitem/4392/4-8
-June-2012-Theory-and-Practice-of-Multiparty-Compu
tation-Aarhus-Denmark
END:VEVENT
END:VCALENDAR