Cargando…
The secure judgment of graphic similarity against malicious adversaries and its applications
With the advent of the era of big data, privacy computing analyzes and calculates data on the premise of protecting data privacy, to achieve data ‘available and invisible’. As an important branch of secure multi-party computation, the geometric problem can solve practical problems in the military, n...
Autores principales: | Liu, Xin, Xu, Yang, Luo, Dan, Xu, Gang, Xiong, Neal, Chen, Xiu-Bo |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10030665/ https://www.ncbi.nlm.nih.gov/pubmed/36944671 http://dx.doi.org/10.1038/s41598-023-30741-6 |
Ejemplares similares
-
Windows Vista security: securing Vista against malicious attacks
por: Grimes, Roger A, et al.
Publicado: (2007) -
Securing web applications: building a strategy for defense against malicious bots
por: Gates, Stephen, et al.
Publicado: (2018) -
Predicting malicious behavior: tools and techniques for ensuring global security
por: Jackson, Gary M
Publicado: (2012) -
Secure Outsourcing of Matrix Determinant Computation under the Malicious Cloud
por: Song, Mingyang, et al.
Publicado: (2021) -
A Novel Hadoop Security Model for Addressing Malicious Collusive Workers
por: Sauber, Amr M., et al.
Publicado: (2021)