共 53 条
[1]
Ahmad Waseem, 2007, 2007 3rd International Symposium on Information Assurance and Security, P273
[2]
Alwen J, 2008, LECT NOTES COMPUT SC, V5157, P497, DOI 10.1007/978-3-540-85174-5_28
[3]
[Anonymous], 2002, P 8 ACM SIGKDD INT C, DOI DOI 10.1145/775047.775142
[4]
[Anonymous], 2012, CoRR
[5]
Secure Centrality Computation Over Multiple Networks
[J].
PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17),
2017,
:957-966
[6]
Basu A., 2011, Proceedings of the 2011 IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom 2011), P223, DOI 10.1109/CloudCom.2011.38
[7]
Privacy-preserving collaborative filtering on the cloud - practical implementation experiences
[J].
2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD 2013),
2013,
:406-413
[8]
Basu Anirban, 2012, P IFIP INT C TRUST M, P17
[9]
Cantador I, 2015, Recommender systems handbook, P919, DOI DOI 10.1007/978-1-4899-7637-627
[10]
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT III,
2018, 10993
:34-64