Login / Signup
STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy.
Zhihua Xia
Qi Gu
Wenhao Zhou
Lizhi Xiong
Jian Weng
Naixue Xiong
Published in:
IEEE Trans. Computers (2024)
Keyphrases
</>
neural network
information systems
access control
search strategy
efficient computation
cryptographic protocols
data encryption