共 50 条
- [1] Privacy-Preserving Two-Party k-Means Clustering in Malicious Model [J]. 2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW), 2013, : 121 - 126
- [3] Privacy-Preserving Quantum Two-Party Geometric Intersection [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 1237 - 1250
- [5] Privacy-Preserving Two-Party Collaborative Filtering on Overlapped Ratings [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (08): : 2948 - 2966
- [6] Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 107 - 114
- [7] Privacy-preserving Two-party Rational Set Intersection Protocol [J]. INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2012, 36 (03): : 277 - 286
- [8] Privacy-preserving two-party rational set intersection protocol [J]. Informatica (Slovenia), 2012, 36 (03): : 277 - 286
- [9] Approximate Two-Party Privacy-Preserving String Matching with Linear Complexity [J]. 2013 IEEE INTERNATIONAL CONGRESS ON BIG DATA, 2013, : 31 - 37
- [10] Application of Secure Two-Party Computation in a Privacy-Preserving Android App [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,