Publisher
Springer Nature Switzerland
Reference14 articles.
1. Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. 51(4), 1–35 (2018)
2. Cheng, Y., Zhang, L., Li, A.: GFL: federated learning on non-IID data via privacy-preserving synthetic data. In: 2023 IEEE International Conference on Pervasive Computing and Communications, pp. 61–70 (2023)
3. Lecture Notes in Computer Science;C Dwork,2006
4. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends Theor. Comput. Sci. 9(3–4), 211–407 (2014)
5. Evans, D., Kolesnikov, V., Rosulek, M.: A pragmatic introduction to secure multi-party computation. Found. Trends Priv. Secur. 2(2–3), 70–246 (2018)