Journal articles on the topic 'Garbled Circuit Protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 20 journal articles for your research on the topic 'Garbled Circuit Protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Ding, Hangchao, Han Jiang, and Qiuliang Xu. "Postquantum Cut-and-Choose Oblivious Transfer Protocol Based on LWE." Security and Communication Networks 2021 (September 8, 2021): 1–15. http://dx.doi.org/10.1155/2021/9974604.
Full textFang, Xin, Stratis Ioannidis, and Miriam Leeser. "SIFO: Secure Computational Infrastructure Using FPGA Overlays." International Journal of Reconfigurable Computing 2019 (December 6, 2019): 1–18. http://dx.doi.org/10.1155/2019/1439763.
Full textSancho, Jorge, José García, and Álvaro Alesanco. "Oblivious Inspection: On the Confrontation between System Security and Data Privacy at Domain Boundaries." Security and Communication Networks 2020 (September 22, 2020): 1–9. http://dx.doi.org/10.1155/2020/8856379.
Full textLi, Mengxing, Quan Feng, Jian Zhao, Mei Yang, Lijun Kang, and Lili Wu. "Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption." Scientific World Journal 2014 (2014): 1–13. http://dx.doi.org/10.1155/2014/525387.
Full textMohassel, Payman, Mike Rosulek, and Ni Trieu. "Practical Privacy-Preserving K-means Clustering." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 414–33. http://dx.doi.org/10.2478/popets-2020-0080.
Full textTueno, Anselme, Florian Kerschbaum, and Stefan Katzenbeisser. "Private Evaluation of Decision Trees using Sublinear Cost." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 266–86. http://dx.doi.org/10.2478/popets-2019-0015.
Full textKiss, Ágnes, Jian Liu, Thomas Schneider, N. Asokan, and Benny Pinkas. "Private Set Intersection for Unequal Set Sizes with Mobile Applications." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (October 1, 2017): 177–97. http://dx.doi.org/10.1515/popets-2017-0044.
Full textRiazi, M. Sadegh, Ebrahim M. Songhori, Ahmad-Reza Sadeghi, Thomas Schneider, and Farinaz Koushanfar. "Toward Practical Secure Stable Matching." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (January 1, 2017): 62–78. http://dx.doi.org/10.1515/popets-2017-0005.
Full textKim, Yong-Ki, Hyeong-Jin Kim, Hyunjo Lee, and Jae-Woo Chang. "Privacy-preserving parallel kNN classification algorithm using index-based filtering in cloud computing." PLOS ONE 17, no. 5 (May 5, 2022): e0267908. http://dx.doi.org/10.1371/journal.pone.0267908.
Full textHuang, Junxin, Yuchuan Luo, Ming Xu, Bowen Hu, and Jian Long. "pShare: Privacy-Preserving Ride-Sharing System with Minimum-Detouring Route." Applied Sciences 12, no. 2 (January 14, 2022): 842. http://dx.doi.org/10.3390/app12020842.
Full textZhang, Liang Feng, and Reihaneh Safavi-Naini. "Privacy-preserving verifiable delegation of polynomial and matrix functions." Journal of Mathematical Cryptology 14, no. 1 (July 3, 2020): 153–71. http://dx.doi.org/10.1515/jmc-2018-0039.
Full textGascón, Adrià, Phillipp Schoppmann, Borja Balle, Mariana Raykova, Jack Doerner, Samee Zahur, and David Evans. "Privacy-Preserving Distributed Linear Regression on High-Dimensional Data." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (October 1, 2017): 345–64. http://dx.doi.org/10.1515/popets-2017-0053.
Full textAlmashaqbeh, Ghada, Fabrice Benhamouda, Seungwook Han, Daniel Jaroslawicz, Tal Malkin, Alex Nicita, Tal Rabin, Abhishek Shah, and Eran Tromer. "Gage MPC: Bypassing Residual Function Leakage for Non-Interactive MPC." Proceedings on Privacy Enhancing Technologies 2021, no. 4 (July 23, 2021): 528–48. http://dx.doi.org/10.2478/popets-2021-0083.
Full textLi, Ye, Zoe L. Jiang, Xuan Wang, Junbin Fang, En Zhang, and Xianmin Wang. "Securely Outsourcing ID3 Decision Tree in Cloud Computing." Wireless Communications and Mobile Computing 2018 (October 4, 2018): 1–10. http://dx.doi.org/10.1155/2018/2385150.
Full textKim, Hyeong-Jin, Hyunjo Lee, Yong-Ki Kim, and Jae-Woo Chang. "Privacy-preserving kNN query processing algorithms via secure two-party computation over encrypted database in cloud computing." Journal of Supercomputing 78, no. 7 (January 17, 2022): 9245–84. http://dx.doi.org/10.1007/s11227-021-04286-2.
Full textDeuber, Dominic, Christoph Egger, Katharina Fech, Giulio Malavolta, Dominique Schröder, Sri Aravinda Krishnan Thyagarajan, Florian Battke, and Claudia Durand. "My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data." Proceedings on Privacy Enhancing Technologies 2019, no. 1 (January 1, 2019): 108–32. http://dx.doi.org/10.2478/popets-2019-0007.
Full textWagh, Sameer, Divya Gupta, and Nishanth Chandran. "SecureNN: 3-Party Secure Computation for Neural Network Training." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 26–49. http://dx.doi.org/10.2478/popets-2019-0035.
Full text"Private Trajectory Intersection Testing: Is Garbled Circuit Better than Custom Protocols?" International Journal of Engineering 34, no. 4 (2021). http://dx.doi.org/10.5829/ije.2021.34.04a.12.
Full textDe Cock, Martine, Rafael Dowsley, Anderson C. A. Nascimento, Davis Railsback, Jianwei Shen, and Ariel Todoki. "High performance logistic regression for privacy-preserving genome analysis." BMC Medical Genomics 14, no. 1 (January 20, 2021). http://dx.doi.org/10.1186/s12920-020-00869-9.
Full textOng, Toan, Ibrahim Lazrig, Indrajit Ray, Indrakshi Ray, and Michael Kahn. "Scalable Secure Privacy-Preserving Record Linkage (PPRL) Methods Using Cloud-based Infrastructure." International Journal of Population Data Science 3, no. 4 (August 23, 2018). http://dx.doi.org/10.23889/ijpds.v3i4.638.
Full text