1.
Two-Server Delegation of Computation on Label-Encrypted Data
[993]
|
2.
PoS4MPC: Automated Security Policy Synthesis for Secure Multi-part..
[685]
|
3.
基于高维特征的图像对抗攻击算法
[592]
|
4.
Cryptanalysis of Morillo-Obrador polynomial delegation schemes
[525]
|
5.
Batch verifiable computation of outsourced functions
[518]
|
6.
Cryptanalysis of Tran-Pang-Deng Verifiable Homomorphic Encryption
[513]
|
7.
基于大数据的移动应用恶意成分检测方法
[485]
|
8.
Outsourcing Scheme of ABE Encryption Secure against Malicious Adve..
[484]
|
9.
基于数据流图指纹的大规模安卓应用克隆检测技术
[468]
|
10.
基于统计的浏览器指纹采集技术
[463]
|
11.
Outsourcing of Verifiable Attribute-Based Keyword Search
[460]
|
12.
Batch verifiable computation of polynomials on outsourced data
[451]
|
13.
A homomorphic proxy re-authenticators based efficient multi-client..
[425]
|
14.
一种安全高效的多服务器外包多项式计算的方法
[423]
|
15.
Multi-matrix verifiable computation
[418]
|
16.
Implementation and evaluation of outsourcing scheme of attribute-b..
[415]
|
17.
Efficient verifiable attribute-based keyword search
[399]
|
18.
No Need to Lift a Finger Anymore? Assessing the Quality of Code Ge..
[396]
|
19.
Privacy-preserving verifiable delegation of polynomial and matrix ..
[361]
|
20.
Protecting data privacy in publicly verifiable delegation of matri..
[360]
|
21.
可验证计算研究进展
[356]
|
22.
An Efficient Method for Realizing Contractions of Access Structure..
[338]
|
23.
Post-Quantum Cheating Detectable Private Information Retrieval
[335]
|
24.
Efficient Threshold Function Secret Sharing With Information-Theor..
[318]
|
25.
Two-Server Verifiable Homomorphic Secret Sharing for High-Degree P..
[318]
|
26.
一种安全高效的委托隐私数据类别预测的方法
[316]
|
27.
一种可验证的隐私保护的卷积神经网络系统
[306]
|
28.
A Dynamic Proactive Secret Sharing Scheme for Quadratic Functions
[305]
|
29.
一种提供公开可验证的外包计算服务的方法
[301]
|
30.
Verifiable Summation of Read-Once Formula Specified Data
[300]
|
31.
Querying Twice to Achieve Information-Theoretic Verifiability in P..
[297]
|
32.
一种公开可验证的隐私保护的支持向量机分类器系统
[287]
|
33.
Byzantine-Robust Private Information Retrieval with Low Communicat..
[274]
|
34.
A Multi-Server Publicly Verifiable Computation Scheme with Context..
[270]
|
35.
A Maintainable Matrix Commitment Scheme with Constant-Size Public ..
[269]
|
36.
一种用*ztürk低延时模平方算法提高区块链吞吐量的方法
[267]
|
37.
Verifiable Homomorphic Secret Sharing for Low Degree Polynomials
[266]
|
38.
上海科技大学张良峰课题组在区块链安全研究方面取得重要进展
[266]
|
39.
Towards Efficient Information-Theoretic Function Secret Sharing
[260]
|
40.
Multi-Server Verifiable Computation of Low-Degree Polynomials
[254]
|
41.
一种可检测作弊服务器的私有信息检索协议的构造方法
[251]
|
42.
Two-Server Verifiable Federated Learning: Unconditional Security a..
[250]
|
43.
用Sun算法在8位机上实现提高区块链吞吐量的方法
[248]
|
44.
一种高效可聚合和可维护的构造无状态区块链系统的方法
[248]
|
45.
Cheater-identifiable homomorphic secret sharing for outsourcing co..
[247]
|
46.
Enhancing Malware Detection for Android Apps: Detecting Fine-Granu..
[247]
|
47.
Multi-Key Homomorphic MACs with Efficient Verification for Quadrat..
[241]
|
48.
Two-Server Private Information Retrieval with Result Verification
[235]
|
49.
一种可验证的隐私保护的机器学习分类器系统
[216]
|
50.
Privacy-Preserving and Publicly Verifiable Matrix Multiplication
[212]
|
51.
On the modulus in matching vector codes
[212]
|
52.
Matproofs: Maintainable Matrix Commitment with Efficient Aggregati..
[211]
|
53.
Publicly Verifiable Homomorphic Secret Sharing for Polynomial Eval..
[186]
|
54.
Private Information Retrieval with Result Verification for More ..
[184]
|
55.
Multi-server verifiable delegation of computations: Unconditional ..
[180]
|
56.
Outsourcing scheme of ABE encryption secure against malicious adve..
[146]
|
57.
Efficient information-theoretic distributed point functions with g..
[68]
|