共 50 条
- [23] Adaptively Secure Computation with Partial Erasures PODC'15: PROCEEDINGS OF THE 2015 ACM SYMPOSIUM ON PRINCIPLES OF DISTRIBUTED COMPUTING, 2015, : 291 - 300
- [24] Secure Intersection-sum Computation Ruan Jian Xue Bao/Journal of Software, 2023, 34 (07): : 3343 - 3353
- [25] SCORAM: Oblivious RAM for Secure Computation CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, : 191 - 202
- [26] DEMO: Secure Computation in Java']JavaScript PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 849 - 851
- [28] Secure kNN Computation on Encrypted Databases ACM SIGMOD/PODS 2009 CONFERENCE, 2009, : 139 - 152
- [29] Malicious Computation Prevention Protocol for Secure Multi-Party Computation TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
- [30] Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 163 - 193