Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference19 articles.
1. Evans D, Kolesnikov V, Rosulek M (2018) A pragmatic introduction to secure multi-party computation. NOW Publishers
2. Sadler C (2018) Protecting privacy with secure multi-party computation, New America, Blog Post athttps://www.newamerica.org/oti/blog/protecting-privacy-secure-multi-party computation/ on June 18
3. Shamir A (1979) How to share a secret. Comm. ACM
4. Goethals B, Laur S, Lipmaa H, Mielikainen T (2004) On private scalar product computation for privacy-preserving data mining. In C.-s. Park and S. Chee, editors, ICISC
5. Dagdelen O, Venturi D (2014) A multiparty protocol for privacy-preserving cooperative linear systems of equations. In Balkan CryptSec
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Robust peer-to-peer learning via secure multi-party computation;Journal of Information and Intelligence;2023-11
2. Online Interactive Teaching System of Sanda Course Based on P2P Network;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022