Author:
Keller Marcel,Scholl Peter
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Aliasgari, M., Blanton, M., Zhang, Y., Steele, A.: Secure computation on floating point numbers. In: NDSS. The Internet Society (2013)
2. Lecture Notes in Computer Science;A. Aly,2013
3. Blanton, M., Steele, A., Aliasgari, M.: Data-oblivious graph algorithms for secure computation and outsourcing. In: Chen, K., Xie, Q., Qiu, W., Li, N., Tzeng, W.G. (eds.) ASIACCS, pp. 207–218. ACM (2013)
4. Lecture Notes in Computer Science;J. Brickell,2005
5. Lecture Notes in Computer Science;O. Catrina,2010
Cited by
79 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy-Preserving Group Closeness Maximization;2024 33rd International Conference on Computer Communications and Networks (ICCCN);2024-07-29
2. Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
3. Efficient Actively Secure DPF and RAM-based 2PC with One-Bit Leakage;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
4. Distributed & Scalable Oblivious Sorting and Shuffling;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
5. Secure shortest distance queries over encrypted graph in cloud computing;Wireless Networks;2024-02-29