共 44 条
[1]
QUOTIENT: Two-Party Secure Neural Network Training and Prediction
[J].
PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19),
2019,
:1231-1247
[2]
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:805-817
[3]
Artikis A., 2014, P JOINT EUR C MACH L, P520
[4]
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II,
2021, 12697
:871-900
[5]
Bracciale L., CRAWDAD dataset roma/taxi (v. 2014-07-03),, V2014, DOI DOI 10.15783/C7QC7M
[7]
Metal: A Metadata-Hiding File-Sharing System
[J].
27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020),
2020,
[9]
Utility-Aware Ridesharing on Road Networks
[J].
SIGMOD'17: PROCEEDINGS OF THE 2017 ACM INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA,
2017,
:1197-1210
[10]
Chun H., 2014, P 9 ACM S INFORM COM, P401, DOI DOI 10.1145/2590296.2590343