Author:
Belorgey Mariya Georgieva,Carpov Sergiu,Deforth Kevin,Jetchev Dimitar,Sae-Tang Abson,Vuille Marius,Gama Nicolas,Katz Jon,Leontiadis Iraklis,Mohammadi Mohsen
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference58 articles.
1. M. Al-Rubaie, P.Y. Wu, J.M. Chang, S.Y. Kung, Privacy-preserving PCA on horizontally-partitioned data, in 2017 IEEE Conference on Dependable and Secure Computing (2017), pp. 280–287
2. M. Aliasgari, M. Blanton, Y. Zhang, A. Steele, Secure computation on floating point numbers, in NDSS (2013)
3. A. Aly, N.P. Smart, Benchmarking privacy preserving scientific operations, in International Conference on Applied Cryptography and Network Security (2019), pp 509–529
4. T. Araki, J. Furukawa, Y. Lindell, A. Nof, K. Ohara, High-throughput semi-honest secure three-party computation with an honest majority, in Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. CCS ’16 (2016), pp. 805–817
5. Aumüller, M., Dietzfelbinger, M., Klaue, P.: How good is multi-pivot quicksort? ACM Transactions on Algorithms (TALG) 13(1), 1–47 (2016)