Font Size: a A A
Keyword [secure two-party computation]
Result: 1 - 16 | Page: 1 of 1
1. Research On Theory Of Practical Secure Two-Party Computation
2. Research On Game Model Of Secret Exchange And Its Application
3. Secure Computing Scheme Based On LWE Problem On
4. Research On Key Technology Of Secure Two-party Computation And Its Applications
5. Research On Fairness In Rational Secure Two-Party Computation
6. The Applications Of Garbled Circuits In Watermarking And Classification Protocols
7. Research On Secure Computation Of Hybrid Identity Type And Its Distributed Simulation
8. Research On Basic Theory And Crucial Technique Of Efficient Secure Two-party Computation
9. Privacy-Preserving Distributed Face Recognition System Based On Garbled Circuit And Deep Learning
10. Reseaches On Privacy-Preserving Data Aggregation And Secure Two-Party Computation
11. Secure Two-party Computation Technology For Mobile Internet
12. Blockchain-based Rational Secure Two-party Computation
13. Research On Privacy-Preserving Application Protocol Based On Secure Two-Party Computing
14. Research On Linear Regression Algorithm For Data Privacy Preserving Based On Two-Party Computing
15. Privacy-preserving Machine Learning Framework Based On Secure Two-party Computation
16. Researches And Applications Of Secure Set Operations Protocols
  <<First  <Prev  Next>  Last>>  Jump to