default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 335 matches
- 2024
- Sepideh Avizheh:
Secure Smart Contract-based Computation (Verifiable computation, Fair two-party protocols, and Resource sharing). University of Calgary, Alberta, Canada, 2024 - Keitaro Hiwatashi, Koji Nuida:
Correlated Randomness Reduction in Domain-Restricted Secure Two-Party Computation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 283-290 (2024) - Zeinab Rahmani, Armando Nolasco Pinto, Luís Soares Barbosa:
Secure two-party computation via measurement-based quantum computing. Quantum Inf. Process. 23(6): 221 (2024) - Zhusen Liu, Weizheng Wang, Yutong Ye, Nan Min, Zhenfu Cao, Lu Zhou, Zhe Liu:
Collusion-Resilient and Maliciously Secure Cloud- Assisted Two-Party Computation Scheme in Mobile Cloud Computing. IEEE Trans. Inf. Forensics Secur. 19: 7019-7032 (2024) - Zhusen Liu, Luyao Wang, Haiyong Bao, Zhenfu Cao, Lu Zhou, Zhe Liu:
Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks. IEEE Trans. Ind. Informatics 20(5): 8007-8018 (2024) - Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation. ACISP (2) 2024: 330-349 - Tianxiang Dai, Yufan Jiang, Yong Li, Fei Mei:
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree. SP (Workshops) 2024: 95-103 - Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng:
OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network. CoRR abs/2403.00239 (2024) - Esther Hänggi, Severin Winkler:
Insecurity of Quantum Two-Party Computation with Applications to Cheat-Sensitive Protocols and Oblivious Transfer Reductions. CoRR abs/2405.12121 (2024) - Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2024: 587 (2024) - Tianxiang Dai, Yufan Jiang, Yong Li, Fei Mei:
NodeGuard: A Highly Efficient Two-Party Computation Framework for Training Large-Scale Gradient Boosting Decision Tree. IACR Cryptol. ePrint Arch. 2024: 535 (2024) - Fredrik Meisingseth, Christian Rechberger, Fabian Schmid:
Practical Two-party Computational Differential Privacy with Active Security. IACR Cryptol. ePrint Arch. 2024: 4 (2024) - Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal, Harshal Shah:
Efficient Permutation Correlations and Batched Random Access for Two-Party Computation. IACR Cryptol. ePrint Arch. 2024: 547 (2024) - 2023
- Li Su, Huizheng Geng, Sixu Guo, Shen He:
A Secure Two-Party Euclidean Distance Computation Scheme Through a Covert Adversarial Model Based on Paillier Encryption. IEEE Access 11: 80986-80996 (2023) - Farhad Taheri Ardakani, Siavash Bayat Sarmadi:
MISC: Multi-Input Secure Two-Party Computation. ISC Int. J. Inf. Secur. 15(2) (2023) - Marco De Vincenzi, Ilaria Matteucci, Fabio Martinelli, Stefano Sebastio:
Application of Secure Two-Party Computation in a Privacy-Preserving Android App. ARES 2023: 144:1-144:7 - Keitaro Hiwatashi, Koji Nuida:
Exponential Correlated Randomness Is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation. ITC 2023: 18:1-18:16 - Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment. DAC 2023: 1-6 - Xintong Wang, Ying Qiu, Jinming Hu, Lili Cao, Yueyue Zhang, Yaping Zhu:
Secure Two-Party Computation for Fingerprinting-based Indoor Localization. ICCC 2023: 1-5 - Hernán Vanegas, Daniel Cabarcas, Diego F. Aranha:
Privacy-Preserving Edit Distance Computation Using Secret-Sharing Two-Party Computation. LATINCRYPT 2023: 67-86 - Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu:
Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning. SP 2023: 534-551 - Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong:
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. USENIX Security Symposium 2023: 6435-6451 - Martin Kutrib, Andreas Malcher:
Reversible Two-Party Computations. AFL 2023: 142-154 - Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Shaoyi Huang, Xi Xie, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
RRNet: Towards ReLU-Reduced Neural Network for Two-party Computation Based Private Inference. CoRR abs/2302.02292 (2023) - Hongwu Peng, Shanglin Zhou, Yukui Luo, Nuo Xu, Shijin Duan, Ran Ran, Jiahui Zhao, Chenghong Wang, Tong Geng, Wujie Wen, Xiaolin Xu, Caiwen Ding:
PASNet: Polynomial Architecture Search Framework for Two-party Computation-based Secure Neural Network Deployment. CoRR abs/2306.15513 (2023) - Ferhat Karakoç, Alptekin Küpçü:
Enabling Two-Party Secure Computation on Set Intersection. IACR Cryptol. ePrint Arch. 2023: 609 (2023) - Wen-jie Lu, Zhicong Huang, Qizhi Zhang, Yuchen Wang, Cheng Hong:
Squirrel: A Scalable Secure Two-Party Computation Framework for Training Gradient Boosting Decision Tree. IACR Cryptol. ePrint Arch. 2023: 527 (2023) - Hernán Darío Vanegas Madrigal, Daniel Cabarcas Jaramillo, Diego F. Aranha:
Privacy-preserving edit distance computation using secret-sharing two-party computation. IACR Cryptol. ePrint Arch. 2023: 1201 (2023) - 2022
- Yulin Wu, Xuan Wang, Willy Susilo, Guomin Yang, Zoe Lin Jiang, Hao Wang, Tong Wu:
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks. Comput. Stand. Interfaces 80: 103571 (2022) - Yuling Chen, Juan Ma, Xianmin Wang, Xinyu Zhang, Huiyu Zhou:
DE-RSTC: A rational secure two-party computation protocol based on direction entropy. Int. J. Intell. Syst. 37(11): 8947-8967 (2022)
skipping 305 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-22 11:44 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint