Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1382436.1382751guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Protocols for secure computations

Published: 03 November 1982 Publication History
  • Get Citation Alerts
  • Abstract

    No abstract available.

    Cited By

    View all
    • (2024)Relational Algorithms for Top-k Query EvaluationProceedings of the ACM on Management of Data10.1145/36549712:3(1-27)Online publication date: 30-May-2024
    • (2024)Fairness-Driven Private Collaborative Machine LearningACM Transactions on Intelligent Systems and Technology10.1145/363936815:2(1-30)Online publication date: 22-Feb-2024
    • (2023)Threshold KNN-shapleyProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3668762(60429-60467)Online publication date: 10-Dec-2023
    • Show More Cited By

    Index Terms

    1. Protocols for secure computations
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Guide Proceedings
          SFCS '82: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
          November 1982
          385 pages

          Publisher

          IEEE Computer Society

          United States

          Publication History

          Published: 03 November 1982

          Qualifiers

          • Article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)Relational Algorithms for Top-k Query EvaluationProceedings of the ACM on Management of Data10.1145/36549712:3(1-27)Online publication date: 30-May-2024
          • (2024)Fairness-Driven Private Collaborative Machine LearningACM Transactions on Intelligent Systems and Technology10.1145/363936815:2(1-30)Online publication date: 22-Feb-2024
          • (2023)Threshold KNN-shapleyProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3668762(60429-60467)Online publication date: 10-Dec-2023
          • (2023)On the gini-impurity preservation for privacy random forestsProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3668075(45055-45082)Online publication date: 10-Dec-2023
          • (2023)Secure floating-point trainingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620591(6329-6346)Online publication date: 9-Aug-2023
          • (2023)Efficient 3PC for binary circuits with application to maliciously-secure DNN inferenceProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620538(5377-5394)Online publication date: 9-Aug-2023
          • (2023)A verified confidential computing as a service framework for privacy preservationProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620502(4733-4750)Online publication date: 9-Aug-2023
          • (2023)GigaDORAMProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620454(3871-3888)Online publication date: 9-Aug-2023
          • (2023)Secure Sampling for Approximate Multi-party Query ProcessingProceedings of the ACM on Management of Data10.1145/36173391:3(1-27)Online publication date: 13-Nov-2023
          • (2023)AQ2PNN: Enabling Two-party Privacy-Preserving Deep Neural Network Inference with Adaptive QuantizationProceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture10.1145/3613424.3614297(628-640)Online publication date: 28-Oct-2023
          • Show More Cited By

          View Options

          View options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media