Articles de revues sur le sujet « Garbled Circuit Protocol »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 37 meilleurs articles de revues pour votre recherche sur le sujet « Garbled Circuit Protocol ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les articles de revues sur diverses disciplines et organisez correctement votre bibliographie.
Ding, Hangchao, Han Jiang, and Qiuliang Xu. "Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE." Security and Communication Networks 2021 (September 8, 2021): 1–15. http://dx.doi.org/10.1155/2021/9974604.
Texte intégralYang, Yaxi, Xiaojian Liang, Xiangfu Song, et al. "Maliciously Secure Circuit Private Set Intersection via SPDZ-Compatible Oblivious PRF." Proceedings on Privacy Enhancing Technologies 2025, no. 2 (2025): 680–96. https://doi.org/10.56553/popets-2025-0082.
Texte intégralFang, Xin, Stratis Ioannidis, and Miriam Leeser. "SIFO: Secure Computational Infrastructure Using FPGA Overlays." International Journal of Reconfigurable Computing 2019 (December 6, 2019): 1–18. http://dx.doi.org/10.1155/2019/1439763.
Texte intégralSancho, Jorge, José García, and Álvaro Alesanco. "Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries." Security and Communication Networks 2020 (September 22, 2020): 1–9. http://dx.doi.org/10.1155/2020/8856379.
Texte intégralSancho, Jorge, José García, and Álvaro Alesanco. "Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries." Security and Communication Networks 2020 (June 7, 2020): 8856379. https://doi.org/10.1155/2020/8856379.
Texte intégralXin Liu, Xin Liu, Xiaomeng Liu Xin Liu, Dan Luo Xiaomeng Liu, Gang Xu Dan Luo, and Xiu-Bo Chen Gang Xu. "Confidentially Compare Rational Numbers under the Malicious Model." 網際網路技術學刊 25, no. 3 (2024): 355–63. http://dx.doi.org/10.53106/160792642024052503002.
Texte intégralMohassel, Payman, Mike Rosulek, and Ni Trieu. "Practical Privacy-Preserving K-means Clustering." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 414–33. http://dx.doi.org/10.2478/popets-2020-0080.
Texte intégralLi, Mengxing, Quan Feng, Jian Zhao, Mei Yang, Lijun Kang, and Lili Wu. "Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/525387.
Texte intégralTueno, Anselme, Florian Kerschbaum, and Stefan Katzenbeisser. "Private Evaluation of Decision Trees using Sublinear Cost." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 266–86. http://dx.doi.org/10.2478/popets-2019-0015.
Texte intégralKiss, Ágnes, Jian Liu, Thomas Schneider, N. Asokan, and Benny Pinkas. "Private Set Intersection for Unequal Set Sizes with Mobile Applications." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 177–97. http://dx.doi.org/10.1515/popets-2017-0044.
Texte intégralRiazi, M. Sadegh, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. "Toward Practical Secure Stable Matching." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 62–78. http://dx.doi.org/10.1515/popets-2017-0005.
Texte intégralKim, Yong-Ki, Hyeong-Jin Kim, Hyunjo Lee, and Jae-Woo Chang. "Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing." PLOS ONE 17, no. 5 (2022): e0267908. http://dx.doi.org/10.1371/journal.pone.0267908.
Texte intégralHuang, Junxin, Yuchuan Luo, Ming Xu, Bowen Hu, and Jian Long. "pShare: Privacy-Preserving Ride-Sharing System with Minimum-Detouring Route." Applied Sciences 12, no. 2 (2022): 842. http://dx.doi.org/10.3390/app12020842.
Texte intégralZhang, Liang Feng, and Reihaneh Safavi-Naini. "Privacy-preserving verifiable delegation of polynomial and matrix functions." Journal of Mathematical Cryptology 14, no. 1 (2020): 153–71. http://dx.doi.org/10.1515/jmc-2018-0039.
Texte intégralSalako, Ademola Oluwaseun, Temilade Oluwatoyin Adesokan-Imran, Olufisayo Juliana Tiwo, Olufunke Cynthia Metibemu, Ogechukwu Scholastica Onyenaucheya, and Oluwaseun Oladeji Olaniyi. "Securing Confidentiality in Distributed Ledger Systems with Secure Multi-party Computation for Financial Data Protection." Journal of Engineering Research and Reports 27, no. 3 (2025): 352–73. https://doi.org/10.9734/jerr/2025/v27i31439.
Texte intégralYu, Mingfei, Dewmini Sudara Marakkalage, and Giovanni De Micheli. "Garbled Circuits Reimagined: Logic Synthesis Unleashes Efficient Secure Computation." Cryptography 7, no. 4 (2023): 61. http://dx.doi.org/10.3390/cryptography7040061.
Texte intégralGascón, Adrià, Phillipp Schoppmann, Borja Balle, et al. "Privacy-Preserving Distributed Linear Regression on High-Dimensional Data." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 345–64. http://dx.doi.org/10.1515/popets-2017-0053.
Texte intégralAlmashaqbeh, Ghada, Fabrice Benhamouda, Seungwook Han, et al. "Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (2021): 528–48. http://dx.doi.org/10.2478/popets-2021-0083.
Texte intégralCheng, Nan, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita, and Kazunari Tozawa. "Constant-Round Private Decision Tree Evaluation for Secret Shared Data." Proceedings on Privacy Enhancing Technologies 2024, no. 1 (2024): 397–412. http://dx.doi.org/10.56553/popets-2024-0023.
Texte intégralLi, Ye, Zoe L. Jiang, Xuan Wang, Junbin Fang, En Zhang, and Xianmin Wang. "Securely Outsourcing ID3 Decision Tree in Cloud Computing." Wireless Communications and Mobile Computing 2018 (October 4, 2018): 1–10. http://dx.doi.org/10.1155/2018/2385150.
Texte intégralLiu, Kun, and Chunming Tang. "Privacy-preserving Naive Bayes classification based on secure two-party computation." AIMS Mathematics 8, no. 12 (2023): 28517–39. http://dx.doi.org/10.3934/math.20231459.
Texte intégralSaleem, Hamza, Amir Ziashahabi, Muhammad Naveed, and Salman Avestimehr. "Hawk: Accurate and Fast Privacy-Preserving Machine Learning Using Secure Lookup Table Computation." Proceedings on Privacy Enhancing Technologies 2024, no. 3 (2024): 42–58. http://dx.doi.org/10.56553/popets-2024-0066.
Texte intégralKim, Hyeong-Jin, Hyunjo Lee, Yong-Ki Kim, and Jae-Woo Chang. "Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing." Journal of Supercomputing 78, no. 7 (2022): 9245–84. http://dx.doi.org/10.1007/s11227-021-04286-2.
Texte intégralDeuber, Dominic, Christoph Egger, Katharina Fech, et al. "My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (2019): 108–32. http://dx.doi.org/10.2478/popets-2019-0007.
Texte intégralWei, Dongying, Dan Wang, Zhiheng Wang, and Yingyi Ma. "A Privacy-Preserving Testing Framework for Copyright Protection of Deep Learning Models." Electronics 13, no. 1 (2023): 133. http://dx.doi.org/10.3390/electronics13010133.
Texte intégralAaraj, Najwa, Abdelrahaman Aly, Tim Güneysu, et al. "FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC." IACR Transactions on Cryptographic Hardware and Embedded Systems 2025, no. 1 (2024): 1–36. https://doi.org/10.46586/tches.v2025.i1.1-36.
Texte intégralWagh, Sameer, Divya Gupta, and Nishanth Chandran. "SecureNN: 3-Party Secure Computation for Neural Network Training." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (2019): 26–49. http://dx.doi.org/10.2478/popets-2019-0035.
Texte intégralHuo, Yachao, Zongqu Zhao, Panke Qin, Shujing Wang, and Chengfu Zheng. "Post‐quantum secure two‐party computing protocols against malicious adversaries." Concurrency and Computation: Practice and Experience, October 4, 2023. http://dx.doi.org/10.1002/cpe.7923.
Texte intégralLevi, Itamar, and Carmit Hazay. "Garbled Circuits from an SCA Perspective." IACR Transactions on Cryptographic Hardware and Embedded Systems, March 6, 2023, 54–79. http://dx.doi.org/10.46586/tches.v2023.i2.54-79.
Texte intégralNieminen, Raine, and Thomas Schneider. "Breaking and Fixing Garbled Circuits When a Gate has Duplicate Input Wires." Journal of Cryptology 36, no. 4 (2023). http://dx.doi.org/10.1007/s00145-023-09472-4.
Texte intégralCui, Hongrui, Xiao Wang, Kang Yang, and Yu Yu. "Actively Secure Half-Gates with Minimum Overhead under Duplex Networks." Journal of Cryptology 38, no. 2 (2025). https://doi.org/10.1007/s00145-025-09539-4.
Texte intégralTozawa, Kazunari, Hiraku Morita, and Takaaki Mizuki. "Single-shuffle card-based protocol with eight cards per gate and its extensions." Natural Computing, January 9, 2025. https://doi.org/10.1007/s11047-024-10006-5.
Texte intégral"Private Trajectory Intersection Testing: Is Garbled Circuit Better than Custom Protocols?" International Journal of Engineering 34, no. 4 (2021). http://dx.doi.org/10.5829/ije.2021.34.04a.12.
Texte intégralDe Cock, Martine, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, and Ariel Todoki. "High performance logistic regression for privacy-preserving genome analysis." BMC Medical Genomics 14, no. 1 (2021). http://dx.doi.org/10.1186/s12920-020-00869-9.
Texte intégralNie, Chenfei, Zhipeng Zhou, Mianxiong Dong, Kaoru Ota, and Qiang Li. "EPIDL: Towards efficient and privacy‐preserving inference in deep learning." Concurrency and Computation: Practice and Experience, April 4, 2024. http://dx.doi.org/10.1002/cpe.8110.
Texte intégralLi, Jinguo, Yan Yan, Kai Zhang, Chunlin Li, and Peichun Yuan. "PCIR: Privacy‐Preserving Convolutional Neural Network Inference With Rapid Responsiveness." Computational Intelligence 41, no. 2 (2025). https://doi.org/10.1111/coin.70030.
Texte intégralOng, Toan, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray, and Michael Kahn. "Scalable Secure Privacy-Preserving Record Linkage (PPRL) Methods Using Cloud-based Infrastructure." International Journal of Population Data Science 3, no. 4 (2018). http://dx.doi.org/10.23889/ijpds.v3i4.638.
Texte intégral