BEGIN:VCALENDAR
VERSION:2.0
PRODID:ILLC Website
X-WR-TIMEZONE:Europe/Amsterdam
BEGIN:VTIMEZONE
TZID:Europe/Amsterdam
X-LIC-LOCATION:Europe/Amsterdam
BEGIN:DAYLIGHT
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
TZNAME:CEST
DTSTART:19700329T020000
RRULE:FREQ=YEARLY;BYMONTH=3;BYDAY=-1SU
END:DAYLIGHT
BEGIN:STANDARD
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
TZNAME:CET
DTSTART:19701025T030000
RRULE:FREQ=YEARLY;BYMONTH=10;BYDAY=-1SU
END:STANDARD
END:VTIMEZONE
BEGIN:VEVENT
UID:/NewsandEvents/Archives/2012/newsitem/4392/4-8
 -June-2012-Theory-and-Practice-of-Multiparty-Compu
 tation-Aarhus-Denmark
DTSTAMP:20120315T000000
SUMMARY:Theory and Practice of Multiparty Computat
 ion, Aarhus, Denmark
DTSTART;VALUE=DATE:20120604
DTEND;VALUE=DATE:20120608
LOCATION:Aarhus, Denmark
DESCRIPTION:Secure Multiparty Computation is a pow
 erful cryptographic notion that - in theory - can 
 solve virtually any cryptographic protocol problem
 . In recent years the technology has been used in 
 practice and holds great promise for future applic
 ations. MPC technology can be used to implement, f
 or instance, voting, auctions, procurement and ben
 chmarking with better security, in particular with
 out anyone having to reveal his private data to an
 yone else.   This workshop brings together people 
 in both theory and practice of the field, and we a
 re convinced that this will prove very productive.
  The first day will be dedicated for tutorials tha
 t cover the basic definitions, constructions and b
 uilding blocks. In the rest of the workshop, leadi
 ng researchers in the field will present their lat
 est results in secure computation. 22 invited spea
 kers have confirmed participation.  For more infor
 mation, see http://cfem.au.dk/events/theory-and-pr
 actice-of-multiparty-computation/
X-ALT-DESC;FMTTYPE=text/html:\n        <p>Secure M
 ultiparty Computation is a powerful cryptographic\
 n        notion that - in theory - can solve virtu
 ally any\n        cryptographic protocol problem. 
 In recent years the technology\n        has been u
 sed in practice and holds great promise for future
 \n        applications.  MPC technology can be use
 d to implement, for\n        instance, voting, auc
 tions, procurement and benchmarking with\n        
 better security, in particular without anyone havi
 ng to reveal\n        his private data to anyone e
 lse.</p>\n        <p>\n        This workshop bring
 s together people in both theory and\n        prac
 tice of the field, and we are convinced that this 
 will\n        prove very productive. The first day
  will be dedicated for\n        tutorials that cov
 er the basic definitions, constructions and\n     
    building blocks. In the rest of the workshop, l
 eading\n        researchers in the field will pres
 ent their latest results in\n        secure comput
 ation. 22 invited speakers have confirmed\n       
  participation.</p>\n    \n        <p>For more inf
 ormation, see <a target="_blank" href="http://cfem
 .au.dk/events/theory-and-practice-of-multiparty-co
 mputation/">http://cfem.au.dk/events/theory-and-pr
 actice-of-multiparty-computation/</a></p>\n    
URL:/NewsandEvents/Archives/2012/newsitem/4392/4-8
 -June-2012-Theory-and-Practice-of-Multiparty-Compu
 tation-Aarhus-Denmark
END:VEVENT
END:VCALENDAR
