共 50 条
- [42] Distributed intrusion detection for secure consensus computations PROCEEDINGS OF THE 46TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2007, : 1778 - 1783
- [43] Hybrid approach for secure mobile agent computations SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 38 - 53
- [44] Improvement and applications of secure outsourcing of scientific computations Journal of Ambient Intelligence and Humanized Computing, 2015, 6 : 763 - 772
- [45] ON PARALLEL COMPUTATIONS OF EXPRESSIONS AND STRAIGHT-LINE PROGRAMS COMPUTERS AND ARTIFICIAL INTELLIGENCE, 1990, 9 (05): : 427 - 439
- [46] Achieving Secure and Differentially Private Computations in Multiparty Settings 2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC), 2017, : 49 - 59
- [47] Privacy of trust in similarity estimation through secure computations 13TH INTERNATIONAL WORKSHOP ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2002, : 498 - 502
- [48] Secure Computations Through Checking Suits of Playing Cards FRONTIERS OF ALGORITHMIC WISDOM, IJTCS-FAW 2022, 2022, 13461 : 110 - 128
- [49] Secure multi-party computations of geometric intersections Qinghua Daxue Xuebao/Journal of Tsinghua University, 2007, 47 (10): : 1692 - 1695
- [50] Secure computations on handheld devices with the help of an untrusted server 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2003, : 458 - 463