1. Aliasgari, M., Blanton, M.: Secure computation of hidden markov models. In: International Conference on Security and Cryptography (SECRYPT) (2013)
2. Aliasgari, M., Blanton, M., Zhang, Y., Steele, A.: Secure computation on floating point numbers. In: Network and Distributed System Security Symposium (NDSS) (2013)
3. Asharov, G., Lindell, Y., Rabin, T.: Perfectly-secure multiplication for any $$t < n/3$$. In: CRYPTO (2011)
4. Bansal, P., Kant, A., Kumar, S., Sharda, A., Gupta, S.: Improved hybrid model of HMM/GMM for speech recognition. In: Book 5 Intelligent Technologies and Applications. Institute of Information Theories and Applications FOI ITHEA (2008)
5. Baudron, O., Fouque, P.-A., Pointcheval, D., Stern, J., Poupard, G.: Practical multi-candidate election scheme. In: ACM Symposium on Principles of Distributed Computing (PODC), pp. 274–283 (2001)