共 44 条
[11]
Damgard Ivan, 2008, International Journal of Applied Cryptography, V1, P22, DOI 10.1504/IJACT.2008.017048
[13]
Practical Secure Decision Tree Learning in a Teletreatment Application
[J].
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014,
2014, 8437
:179-194
[14]
Dowlin N, 2016, PR MACH LEARN RES, V48
[15]
Du Wenliang, 2002, Proceedings of the IEEE International Conference on Privacy, Security and Data Mining, V14, P1
[16]
Fredrikson M, 2014, PROCEEDINGS OF THE 23RD USENIX SECURITY SYMPOSIUM, P17
[17]
Goldreich O., 1987, P 19 ANN P ACM S THE, DOI DOI 10.1145/28395.28416
[18]
Goldreich O., 2009, FDN CRYPTOGRAPHY, V2