Publisher
Springer International Publishing
Reference41 articles.
1. Angel, S., Chen, H., Laine, K., Setty, S.T.V.: PIR with compressed queries and amortized query processing. In: Proceedings of the 2018 IEEE Symposium on Security and Privacy, SP 2018, 21–23 May 2018, San Francisco, California, USA, pp. 962–979. IEEE Computer Society (2018). https://doi.org/10.1109/SP.2018.00062
2. Angelou, N.: Asymmetric private set intersection with applications to contact tracing and private vertical federated machine learning. CoRR abs/2011.09350 (2020). https://arxiv.org/abs/2011.09350
3. Azar, Y., Broder, A.Z., Karlin, A.R., Upfal, E.: Balanced allocations. In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 593–602 (1994)
4. Badrinarayanan, S., Miao, P., Xie, T.: Updatable private set intersection. Proc. Priv. Enhanc. Technol. 2022(2), 378–406 (2022). https://doi.org/10.2478/popets-2022-0051
5. Baldi, P., Baronio, R., Cristofaro, E.D., Gasti, P., Tsudik, G.: Countering GATTACA: efficient and secure testing of fully-sequenced human genomes. In: Chen, Y., Danezis, G., Shmatikov, V. (eds.) Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS 2011, Chicago, Illinois, USA, 17–21 October 2011, pp. 691–702. ACM (2011). https://doi.org/10.1145/2046707.2046785
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献