共 50 条
- [1] Privacy-preserving Naive Bayes classification based on secure two-party computation AIMS MATHEMATICS, 2023, 8 (12): : 28517 - 28539
- [2] Application of Secure Two-Party Computation in a Privacy-Preserving Android App 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
- [4] Privacy preserving sequential pattern mining based on secure two-party computation PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 1227 - +
- [5] Privacy preserving association rules mining based on secure two-party computation INTELLIGENT CONTROL AND AUTOMATION, 2006, 344 : 969 - 975
- [6] An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast 2012 10th Annual International Conference on Privacy, Security and Trust, PST 2012, 2012, : 9 - 16
- [7] ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols COMPUTER JOURNAL, 2014, 57 (04): : 494 - 509
- [8] An Implementation of Secure Two-Party Computation for Smartphones with Application to Privacy-Preserving Interest-Cast MOBICOM 12: PROCEEDINGS OF THE 18TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2012, : 447 - 449
- [9] Secure Two-Party Computation Is Practical ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 250 - +
- [10] Privacy-Preserving Two-Party Bartering Secure Against Active Adversaries 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,