共 50 条
- [1] Secure Multi-party Computation of Differentially Private Median [J]. PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, 2020, : 2147 - 2164
- [2] A Fast and Secure Transformer Inference Scheme with Secure Multi-Party Computation [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (05): : 1218 - 1229
- [5] Privacy preserving sequential pattern mining based on secure multi-party computation [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 149 - 154
- [6] Secure Multi-Party Computation [J]. PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
- [7] Secure Multi-party Computation of Differentially Private Heavy Hitters [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 2361 - 2377
- [8] Privacy preserving E-negotiation protocols based on secure multi-party computation [J]. PROCEEDINGS OF THE IEEE SOUTHEASTCON 2004: EXCELLENCE IN ENGINEERING, SCIENCE, AND TECHNOLOGY, 2005, : 455 - 461
- [9] Heterogeneous Secure Multi-Party Computation [J]. NETWORKING 2012, PT II, 2012, 7290 : 198 - 210
- [10] Quorum-based secure multi-party computation [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 375 - 390