共 44 条
[1]
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1231-1247
[2]
Balke WT, 2004, LECT NOTES COMPUT SC, V2992, P256
[3]
BleepingComputer, Flexbooker discloses data breach, over 3.7 million accounts impacted
[4]
The Skyline operator
[J].
17TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS,
2001,
:421-430
[5]
Bothe S., 2014, P INT WORKSH PRIV SE
[6]
Metal: A Metadata-Hiding File-Sharing System
[J].
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020),
2020,
[7]
SPDZ2k : Efficient MPC mod 2k for Dishonest Majority
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II,
2018, 10992
:769-798
[8]
SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform
[J].
2020 IEEE 36TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING (ICDE 2020),
2020,
:253-264
[9]
Dellis E., 2006, P ACM CIKM
[10]
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation
[J].
22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015),
2015,