共 50 条
[1]
Amazon Web Services, 2023, Amazon timestream
[2]
Aminikhanghahi S, 2019, IEEE T KNOWL DATA EN, V31, P1010, DOI [10.1109/tkde.2018.2850347, 10.1109/TKDE.2018.2850347]
[3]
[Anonymous], 1994, Time Series Analysis
[4]
Secure Graph Analysis at Scale
[J].
CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2021,
:610-629
[5]
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:805-817
[6]
Secret-Shared Joins with Multiplicity from Aggregation Trees
[J].
PROCEEDINGS OF THE 2022 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2022,
2022,
:209-222
[7]
Bost R., 2017, IACR Cryptol. ePrint Arch., V2017, P1060
[8]
Bothe S., 2014, P 1 INT WORKSH PRIV, P37
[9]
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2021, PT II,
2021, 12697
:871-900
[10]
Secure Computation with Preprocessing via Function Secret Sharing
[J].
THEORY OF CRYPTOGRAPHY, TCC 2019, PT I,
2019, 11891
:341-371