Search

Your search keyword '"Secure two-party computation"' showing total 816 results

Search Constraints

Start Over You searched for: Descriptor "Secure two-party computation" Remove constraint Descriptor: "Secure two-party computation"
816 results on '"Secure two-party computation"'

Search Results

1. Updatable Private Set Intersection Revisited: Extended Functionalities, Deletion, and Worst-Case Complexity

2. COMPLETE CHARACTERIZATION OF FAIRNESS IN SECURE TWO-PARTY COMPUTATION OF BOOLEAN FUNCTIONS.

3. A Ciphertext Reduction Scheme for Garbling an S-Box in an AES Circuit with Minimal Online Time.

4. EG-STC: An Efficient Secure Two-Party Computation Scheme Based on Embedded GPU for Artificial Intelligence Systems.

6. PRIDA: PRIvacy-Preserving Data Aggregation with Multiple Data Customers

8. PrivMail: A Privacy-Preserving Framework for Secure Emails

9. Post‐quantum secure two‐party computing protocols against malicious adversaries.

10. Cut-and-choose bilateral oblivious transfer protocol based on DDH assumption.

11. Privacy-preserving Naive Bayes classification based on secure two-party computation

12. Robust Publicly Verifiable Covert Security: Limited Information Leakage and Guaranteed Correctness with Low Overhead

13. Semi-Honest 2-Party Faithful Truncation from Two-Bit Extraction

14. Predicate Private Set Intersection with Linear Complexity

15. A Hybrid Secure Two-Party Protocol for Vertical Federated Learning

16. Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model.

17. Making Private Function Evaluation Safer, Faster, and Simpler

18. Confirmation method for the detection of malicious encrypted traffic with data privacy protection

19. Privacy‐preserving CNN feature extraction and retrieval over medical images.

20. Datalog Static Analysis in Secrecy

21. POPS: an off-peak precomputing scheme for privacy-preserving computing.

22. Secure Two-Party Computation in a Quantum World

23. Efficient Two-Party Integer Comparison With Block Vectorization Mechanism

24. (Server-Aided) Two-Party Multiplication of Encrypted Shares Using (k, n) Threshold Secret Sharing With N ≥ k Servers

25. Private Set Intersection: A Multi-Message Symmetric Private Information Retrieval Perspective.

26. 支持数据隐私保护的恶意加密流量检测确认方法.

27. Commodity-Based 2PC for Arithmetic Circuits

28. Improved Multiplication Triple Generation over Rings via RLWE-Based AHE

29. 基于安全两方计算的隐私保护线性回归算法.

30. Permutable Cut-and-Choose Oblivious Transfer and Its Application

31. Fast and Accurate Likelihood Ratio-Based Biometric Verification Secure Against Malicious Adversaries.

32. Fast Optimistically Fair Cut-and-Choose 2PC

33. Designing Fully Secure Protocols for Secure Two-Party Computation of Constant-Domain Functions

34. Secure Two-Party Computation with Fairness - A Necessary Design Principle

35. Practical Privacy-Preserving Face Authentication for Smartphones Secure Against Malicious Clients.

36. Error Tolerance Bound in QKD-Based Quantum Private Query.

37. On the Power of Secure Two-Party Computation

38. Secure Error-Tolerant Graph Matching Protocols

39. Differentially private data publishing for arbitrarily partitioned data.

40. A Secure and Efficient Framework for Privacy Preserving Social Recommendation

41. Privacy-Preserving Energy-Reading for Smart Meter

42. Secure extended wildcard pattern matching protocol from cut-and-choose oblivious transfer.

43. On the Power of Secure Two-Party Computation.

44. Rational adversary with flexible utility in secure two-party computation.

45. Unlimited security by using voice and walk stamp as tools.

46. Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting.

47. Secure Collaborative Publicly Verifiable Computation

48. Privacy-Preserving Trust Management Mechanisms from Private Matching Schemes

49. Towards Characterizing Complete Fairness in Secure Two-Party Computation

50. Towards Secure Two-Party Computation from the Wire-Tap Channel

Catalog

Books, media, physical & digital resources