共 16 条
- [1] Beimel A., 2011, P 3 INT C COD CRYPT
- [2] Canetti R., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P639, DOI 10.1145/237814.238015
- [3] Secure Multi-party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data [J]. NEURAL INFORMATION PROCESSING, PT II, 2015, 9490 : 337 - 345
- [4] Chida K., 2011, J INFORM PROCESSING, V52, P2674
- [5] Cramer R., 2000, P INT C THEOR APPL C
- [6] Miyajima Hirofumi, 2016, IAENG International Journal of Computer Science, V43, P270
- [7] Miyajima H., 2017, ARTIF INTELL RES, V6, P57
- [8] Miyajima H., 2017, NEW PRIVACY PRESERVI, V6
- [9] New Methods to Ensure Security to Increase User's Sense of Safety in Cloud Services [J]. 2014 IEEE 11TH INTL CONF ON UBIQUITOUS INTELLIGENCE AND COMPUTING AND 2014 IEEE 11TH INTL CONF ON AUTONOMIC AND TRUSTED COMPUTING AND 2014 IEEE 14TH INTL CONF ON SCALABLE COMPUTING AND COMMUNICATIONS AND ITS ASSOCIATED WORKSHOPS, 2014, : 859 - 866
- [10] Miyazaki K., 1997, Journal of Japanese Society for Artificial Intelligence, V12, P78