共 50 条
- [21] Social rational secure multi-party computation [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
- [22] Secure multi-party computation in large networks [J]. DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
- [24] Malicious Computation Prevention Protocol for Secure Multi-Party Computation [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
- [25] Secure Multi-Party Computation Based on Cut-and-Choose Technology [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (08): : 1800 - 1818
- [26] A New Approach to Interdomain Routing Based on Secure Multi-Party Computation [J]. PROCEEDINGS OF THE 11TH ACM WORKSHOP ON HOT TOPICS IN NETWORKS (HOTNETS-XI), 2012, : 37 - 42
- [27] Brief Announcement: Secure Data Structures based on Multi-Party Computation [J]. PODC 11: PROCEEDINGS OF THE 2011 ACM SYMPOSIUM PRINCIPLES OF DISTRIBUTED COMPUTING, 2011, : 291 - 292
- [28] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209
- [29] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS [J]. BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
- [30] Secure Multi-Party Computation for Machine Learning: A Survey [J]. IEEE ACCESS, 2024, 12 : 53881 - 53899