共 31 条
[1]
Doan AH, Halevy A, Ives Z., Principles of Data Integration, (2012)
[2]
Shi DY, Wang YS, Zheng PF, Tong YX., Cross-Silo federated learning-to-rank, Ruan Jian Xue Bao/Journal of Software, 32, 3, pp. 669-688, (2021)
[3]
Liu C, Wang XS, Nayak K, Et al., Oblivm: A programming framework for secure computation, Proc. of the 2015 IEEE Symp. on Security and Privacy, pp. 359-376, (2015)
[4]
Zahur S, Evans D., Obliv-C: A language for extensible data-oblivious computation, IACR Cryptology ePrint Archive, 2015, (2015)
[5]
Bater J, Elliott G, Eggen C, Et al., SMCQL: Secure query processing for private data networks, Proc. of the 2017 VLDB Endowment, 10, 6, pp. 673-684, (2017)
[6]
Volgushev N, Schwarzkopf M, Getchell B, Et al., Conclave: Secure multi-party computation on big data, Proc. of the 14th EuroSys Conf. ACM, (2019)
[7]
Hastings M, Hemenway B, Noble D, Et al., Sok: General purpose compilers for secure multi-party computation, Proc. of the 2019 IEEE Symp. on Security and Privacy, pp. 1220-1237, (2019)
[8]
Bogdanov D, Laur S, Willemson J., Sharemind: A framework for fast privacy-preserving computations, Proc. of the 2008 European Symp. on Research in Computer Security, pp. 192-206, (2008)
[9]
Keller M., MP-SPDZ: A versatile framework for multi-party computation, Proc. of the 2020 ACM SIGSAC Conf. on Computer and Communications Security, pp. 1575-1590, (2020)
[10]
Shamir A., How to share a secret, Communications of the ACM, 22, 11, pp. 612-613, (1979)