Secure Multiparty Multisets Computation

被引:0
|
作者
Pan, Jiahao [1 ]
Dou, Jiawei [1 ]
机构
[1] School of Mathematics and Statistics, Shaanxi Normal University, Xi’an,710119, China
关键词
Compendex;
D O I
10.6633/IJNS.202305_25(3).05
中图分类号
学科分类号
摘要
Cryptography
引用
收藏
页码:425 / 430
相关论文
共 50 条
  • [21] ON THE COMPUTATION OF STEPWISE REGRESSIONS.
    Osborne, M.R.
    Australian Computer Journal, 1976, 8 (02): : 61 - 68
  • [22] Improved computation for levenbergmarquardt training
    Department of Electrical and Computer Engineering, Auburn University, Auburn, AL 36849-5201, United States
    IEEE Trans Neural Networks, 6 (930-937):
  • [23] Secure communication based on network coding
    Cao, Zhang-Hua
    Tang, Yuan-Sheng
    Tongxin Xuebao/Journal on Communications, 2010, 31 (8 A): : 188 - 194
  • [24] Secure remote access to substation information
    De Sousa, J.
    Fitch, J.
    IEE Conf Publ, (697-700):
  • [25] ENCIPHERING DATA FOR SECURE TRANSMISSION.
    Meyer, Carl H.
    Computer Design, 1974, 13 (04): : 129 - 134
  • [26] Secure code generation for web applications
    SAP Research - CEC Karlsruhe, Germany
    不详
    不详
    Lect. Notes Comput. Sci., 1600, (96-113):
  • [27] Framework design of secure sensor sharing
    Li, Ruidong
    Inoue, Masugi
    IEEE International Conference on Communications, 2011,
  • [28] Secure Federated Monitoring of Heterogeneous Networks
    Brennan, Rob
    Feeney, Kevin
    Song, Yuqian
    O'Sullivan, Declan
    IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (11) : 63 - 71
  • [29] Secure and Efficient Communication in Smart Grids
    Fouda, Mostafa M.
    Ibrahem, Mohamed I.
    ENERGIES, 2023, 16 (15)
  • [30] Mermin polytopes in quantum computation and foundations
    Okay C.
    Chung H.Y.
    Ipek S.
    Quantum Information and Computation, 2023, 23 (9-10) : 733 - 779