-
1
Attribute generalization mix-zone based on multiple secure computation
Published 2019-04-01Subjects: Get full text
Article -
2
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
3
Privacy-preserving trajectory similarity computation method
Published 2022-11-01Subjects: Get full text
Article -
4
Light weighted privacy protection ViT inference framework based on secret sharing
Published 2024-04-01Subjects: Get full text
Article -
5
Secure Biometric Verification in the Presence of Malicious Adversaries
Published 2025-01-01Subjects: Get full text
Article -
6
Review of privacy computing techniques for multi-party data fusion analysis
Published 2024-12-01Subjects: “…data collaborative secure computing…”
Get full text
Article -
7
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01Subjects: Get full text
Article -
8
Design method of secure computing protocol for deep neural network
Published 2020-08-01Subjects: Get full text
Article -
9
Survey of Distributed Ledger Technology (DLT) for Secure and Scalable Computing
Published 2025-01-01Subjects: Get full text
Article