共 50 条
- [42] From Input Private to Universally Composable Secure Multi-party Computation Primitives [J]. 2014 IEEE 27TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2014, : 184 - 198
- [44] Secure Multi-Party Computation in Differential Private Data with Data Integrity Protection [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATIONS TECHNOLOGIES (ICCCT 15), 2015, : 180 - 184
- [45] Composing Differential Privacy and Secure Computation: A case study on scaling private record linkage [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 1389 - 1406
- [46] Secure Communication with Coded Wavefronts [J]. 2017 CONFERENCE ON LASERS AND ELECTRO-OPTICS EUROPE & EUROPEAN QUANTUM ELECTRONICS CONFERENCE (CLEO/EUROPE-EQEC), 2017,
- [48] Exploitation of Stragglers in Coded Computation [J]. 2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 1988 - 1992
- [49] Coded Computation for Multicore Setups [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 2413 - 2417
- [50] Coded Computation of Multiple Functions [J]. 2023 IEEE INFORMATION THEORY WORKSHOP, ITW, 2023, : 468 - 473