搜索结果: 1-4 共查到“军事学 datasets”相关记录4条 . 查询时间(0.049 秒)
Efficient Delegated Private Set Intersection on Outsourced Private Datasets
Private Set Intersection Secure Computation Cloud Computing
2018/5/28
Private set intersection (PSI) is an essential cryptographic protocol that has many real world applications. As cloud computing power and popularity have been swiftly growing, it is now desirable to l...
concerto: A Methodology Towards Reproducible Analyses of TLS Datasets
SSL/TLS reproducible analysis
2017/2/20
Over the years, SSL/TLS has become an essential part of Internet security. As such, it should offer robust and state-of-the-art security, in particular for HTTPS, its first application. Theoretically,...
Secure Linear Regression on Vertically Partitioned Datasets
cryptographic protocols scalable solutions
2016/12/9
We propose multi-party computation protocols for securely computing a linear regression model from a training dataset whose columns are distributed among several parties. Our solution enables organiza...
Verifiable Delegation of Computation over Large Datasets
cryptographic protocols / verifiable computation diffie-hellman bilinear maps
2012/3/29
We study the problem of computing on large datasets that are stored on an untrusted server. We follow the approach of \emph{amortized verifiable computation} introduced by Gennaro, Gentry, and Parno i...