Secure Multi-Party Computation Against Passive Adversaries | SpringerLink
Privacy Preserving Medical Data Analytics using Secure Multi Party Computation. An End-To-End Use Case.
Comprehensive Research on Privacy Preserving Emphasizing on Distributed Clustering
PDF] Secure Multiparty Computation during Privacy Preserving Data Mining: Inscrutability Aided Protocol for Indian Healthcare Sector | Semantic Scholar
Analysis and Evaluation of Schemes for Secure Sum in Collaborative Frequent Itemset Mining across Horizontally Partitioned Data
Privacy-Preserving Analytics and Secure Multiparty Computation
Week 5 Reading Assignment: “Secure Multiparty Computation for Privacy-Preserving Data Mining“ Discussion Summary Question
Applied Sciences | Free Full-Text | Generation and Distribution of Quantum Oblivious Keys for Secure Multiparty Computation
Application of Secure Multiparty Computation in Privacy Preserving Data Mining
Privacy Preserving Data Mining (PPDM) Techniques - E2MATRIX RESEARCH LAB
Perfectly Privacy-Preserving AI. What is it and how do we achieve it? | by Patricia Thaine | Towards Data Science
What is Secure Multi-Party Computation? | by PyTorch | PyTorch | Medium
PDF) Fostering the Uptake of Secure Multiparty Computation in E-Commerce | Octavian Catrina and Octavian Catrina - Academia.edu
PDF] Secure Multiparty Computation during Privacy Preserving Data Mining: Inscrutability Aided Protocol for Indian Healthcare Sector | Semantic Scholar
Secure Multiparty Computation for Privacy Preserving Data Mining
An efficient method for privacy preserving data mining in secure multiparty computation