共 50 条
- [21] Realistic Failures in Secure Multi-party Computation THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
- [23] Secure Multi-party Computation and Its Applications INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 3 - 5
- [24] Social rational secure multi-party computation CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
- [25] A Verifiable Federated Learning Scheme Based on Secure Multi-party Computation WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT II, 2021, 12938 : 198 - 209
- [26] MPCFL: Towards Multi-party Computation for Secure Federated Learning Aggregation 16TH IEEE/ACM INTERNATIONAL CONFERENCE ON UTILITY AND CLOUD COMPUTING, UCC 2023, 2023,
- [28] Malicious Computation Prevention Protocol for Secure Multi-Party Computation TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
- [29] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
- [30] Minimal Complete Primitives for Secure Multi-Party Computation Journal of Cryptology, 2005, 18 : 37 - 61