Author:
Ali Mohammad,Mohajeri Javad,Sadeghi Mohammad-Reza,Liu Ximeng
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference43 articles.
1. Efficient delegated private set intersection on outsourced private datasets;Abadi;IEEE Trans. Depend. Secure Comput.,2017
2. R. Agrawal, R. Srikant, Privacy-preserving data mining, in: ACM Sigmod Record, vol. 29, No. 2, 2000, ACM, pp. 439–450.
3. Secure approximation of edit distance on genomic data;Al Aziz;BMC Med. Genom.,2017
4. A fully distributed revocable ciphertext-policy hierarchical attribute-based encryption without pairing;Ali;IACR Cryptol. ePrint Arch.,2018
5. Privacy-preserving search of similar patients in genomic data;Asharov;Proc. Privacy Enhanc. Technol.,2018
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献