Author:
Asharov Gilad,Lindell Yehuda,Schneider Thomas,Zohner Michael
Cited by
189 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Privacy Preserving Biometric Authentication for Fingerprints and Beyond;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
2. Don’t Eject the Impostor: Fast Three-Party Computation With a Known Cheater;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
3. A Flexible and Verifiable Keyword PIR Scheme for Cloud–Edge–Terminal Collaboration in AIoT;IEEE Internet of Things Journal;2024-05-15
4. Enhancing Cryptography Using Regression And Feature Selection;2024 International Conference on Communication, Computing and Internet of Things (IC3IoT);2024-04-17
5. ScionFL: Efficient and Robust Secure Quantized Aggregation;2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML);2024-04-09