skip to main content
10.5555/1382436.1382751guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Protocols for secure computations

Published: 03 November 1982 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2024)Faster Homomorphic Evaluation of Arbitrary Bivariate Integer Functions via Homomorphic Linear TransformationProceedings of the 12th Workshop on Encrypted Computing & Applied Homomorphic Cryptography10.1145/3689945.3694804(76-86)Online publication date: 19-Nov-2024
  • (2024)A Survey on Federated Unlearning: Challenges, Methods, and Future DirectionsACM Computing Surveys10.1145/367901457:1(1-38)Online publication date: 19-Jul-2024
  • (2024)Relational Algorithms for Top-k Query EvaluationProceedings of the ACM on Management of Data10.1145/36549712:3(1-27)Online publication date: 30-May-2024
  • Show More Cited By
  1. Protocols for secure computations

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      SFCS '82: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
      November 1982
      385 pages

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 03 November 1982

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 28 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Faster Homomorphic Evaluation of Arbitrary Bivariate Integer Functions via Homomorphic Linear TransformationProceedings of the 12th Workshop on Encrypted Computing & Applied Homomorphic Cryptography10.1145/3689945.3694804(76-86)Online publication date: 19-Nov-2024
      • (2024)A Survey on Federated Unlearning: Challenges, Methods, and Future DirectionsACM Computing Surveys10.1145/367901457:1(1-38)Online publication date: 19-Jul-2024
      • (2024)Relational Algorithms for Top-k Query EvaluationProceedings of the ACM on Management of Data10.1145/36549712:3(1-27)Online publication date: 30-May-2024
      • (2024)Fairness-Driven Private Collaborative Machine LearningACM Transactions on Intelligent Systems and Technology10.1145/363936815:2(1-30)Online publication date: 22-Feb-2024
      • (2024)On Data Distribution Leakage in Cross-Silo Federated LearningIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.334932336:7(3312-3328)Online publication date: 3-Jan-2024
      • (2023)Threshold KNN-shapleyProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3668762(60429-60467)Online publication date: 10-Dec-2023
      • (2023)On the gini-impurity preservation for privacy random forestsProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3668075(45055-45082)Online publication date: 10-Dec-2023
      • (2023)Secure floating-point trainingProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620591(6329-6346)Online publication date: 9-Aug-2023
      • (2023)Efficient 3PC for binary circuits with application to maliciously-secure DNN inferenceProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620538(5377-5394)Online publication date: 9-Aug-2023
      • (2023)A verified confidential computing as a service framework for privacy preservationProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620502(4733-4750)Online publication date: 9-Aug-2023
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media