共 50 条
- [2] Secure multi-party computation of set-inclusion and graph-inclusion Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2005, 42 (10): : 1647 - 1653
- [4] Practical protocol for Yao’s millionaires problem enables secure multi-party computation of metrics and efficient privacy-preserving k-NN for large data sets Knowledge and Information Systems, 2009, 21 : 327 - 363
- [5] Secure multi-party computation protocol for sequencing problem Science China Information Sciences, 2011, 54 : 1654 - 1662
- [6] Secure multi-party computation protocol for sorting problem Hsi An Chiao Tung Ta Hsueh, 2008, 2 (231-233+255): : 231 - 233
- [9] Secure Multi-Party Computation PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 2157 - 2159
- [10] Protocols for Secure Computation of Set-Inclusion with the Unencrypted Method Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2017, 54 (07): : 1549 - 1556