Cited By
View all- ZHOU JKONDO M(2025)Imperceptible Trojan Attacks to the Graph-Based Big Data Processing in Smart SocietyIEICE Transactions on Information and Systems10.1587/transinf.2024PAP0006E108.D:1(37-45)Online publication date: 1-Jan-2025
- Attema Tvan Baarsen Avan den Berg SCapitão PDunning VKohl L(2024)Communication-Efficient Multi-Party Computation for RMS ProgramsIACR Communications in Cryptology10.62056/ab0lmp-3yOnline publication date: 8-Jul-2024
- Breuer MHein PPompe LMeyer UWetzel S(2024)Prioritization and exchange chains in privacy-preserving kidney exchangeJournal of Computer Security10.3233/JCS-23001232:4(349-404)Online publication date: 26-Aug-2024
- Show More Cited By