Skip to main content

Download (2)

PDF: Time to break the telecom bottleneck

PDF: Time to break the telecom bottleneck

Telecoms: You’re sitting on gold. Learn how to use it - without losing control. This guide outlines how telecom operators can evolve beyond connectivity by activating verified user data through privacy-first infrastructure. It explores how to become a digital trust platform through decentralized ...

PDF: From data sensitivity to regulatory strength

PDF: From data sensitivity to regulatory strength

Learn how public authorities can collaborate—without compromising data or legal frameworks. Designed for Scandinavian authorities, this report outlines how regulators and government agencies can use privacy-first technologies to securely collaborate and meet legal requirements. Includes real-world ...

PDF: The future of data privacy: Confidential Computing explained

PDF: The future of data privacy: Confidential Computing explained

Confidential Computing is redefining how sensitive data is handled in the cloud. This paper explains how it protects data while it’s in use, enabling secure collaboration between institutions without compromising confidentiality. Readers will learn how secure enclaves and Multi-Party Computation ...

PDF: Guide to secure data collaboration

PDF: Guide to secure data collaboration

Unlock data silos without risking privacy. Discover how secure collaboration can become your biggest advantage. This guide explains how combining Multi-Party Computation (MPC) and blockchain allows companies to collaborate on sensitive data without exposing it. Explore real-world use cases in ...

PDF: Advanced Fraud Detection with Partisia Platform

Guide to advanced fraud detection and Anti-Money Laundering Fraud and money laundering continue to evolve faster than traditional detection systems. This guide explores how the Partisia platform uses privacy-preserving computation to enable financial institutions to share intelligence securely and ...

PDF: Whitepaper - Secure Multiparty Computation Goes Live

PDF: Whitepaper - Secure Multiparty Computation Goes Live

Read the official whitepaper that reports on the first large-scale and practical application of Secure Multi-Party Computation, which took place in January 2008. Introduction How a group of researchers pioneered Multi-Party Computation with a sugar beet auction In the whitepaper, Secure Multiparty ...

PDF: Lightpaper - Decentralized Identities - DID

PDF: Lightpaper - Decentralized Identities - DID

The basic concept The goal of the Partisia decentralised Identity is to connect people (and things) with trustworthy verifiable attributes and other verifiable information. The trustworthy information comes from multiple verifiable sources such as the issuer of driver's licenses or education ...