搜索结果: 1-6 共查到“军事学 Secure Evaluation”相关记录6条 . 查询时间(0.078 秒)
Secure Evaluation of Quantized Neural Networks
Machine Learning Multi-Party Computation Quantization
2019/2/27
Machine Learning models, and specially convolutional neural networks (CNNs), are at the heart of many day-to-day applications like image classification and speech recognition. The need for evaluating ...
Secure evaluation of polynomial using privacy ring homomorphisms
elliptic curve cryptosystem factoring public-key cryptography
2011/1/18
Method of secure evaluation of polynomial y=F(x_1, …, x_k) over some rings on untrusted computer is proposed. Two models of untrusted computer are considered: passive and active. In passive model untr...
Secure evaluation of polynomial using privacy ring homomorphisms
cryptographic protocols / elliptic curve cryptosystem factoring public-key cryptography
2012/3/30
Method of secure evaluation of polynomial y=F(x_1, …, x_k) over some rings on untrusted computer is proposed. Two models of untrusted computer are considered: passive and active. In passive model untr...
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Secure Evaluation Private Linear Branching Programs Medical Applications
2009/6/12
Diagnostic and classification algorithms play an important role in data analysis, with applications
in areas such as health care, fault diagnostics, or benchmarking. Branching programs (BP)
is a pop...
Practical Secure Evaluation of Semi-Private Functions
SFE of semi-private functions Yao's protocol topology optimization
2009/6/12
Two-party Secure Function Evaluation (SFE) is a very useful cryptographic
tool which allows two parties to evaluate a function known to both parties
on their private (secret) inputs. Some applicatio...
Secure Evaluation of Private Functions with Application to Data Classification
universal circuits secure evaluation of private functions neural networks
2009/6/9
Secure Evaluation of Private Functions (PF-SFE) allows two
parties to compute a private function which is known by one party only
on private data of both. It is known that PF-SFE can be reduced to
...