Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Practical secure computation outsourcing: A survey
The rapid development of cloud computing promotes a wide deployment of data and
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
computation outsourcing to cloud service providers by resource-limited entities. Based on a …
Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection
Constrained shortest distance (CSD) querying is one of the fundamental graph query
primitives, which finds the shortest distance from an origin to a destination in a graph with a …
primitives, which finds the shortest distance from an origin to a destination in a graph with a …
[PDF][PDF] Business intelligence improved by data mining algorithms and big data systems: an overview of different tools applied in industrial research
The proposed paper shows different tools adopted in an industry project oriented on
business intelligence (BI) improvement. The research outputs concern mainly data mining …
business intelligence (BI) improvement. The research outputs concern mainly data mining …
Grecs: Graph encryption for approximate shortest distance queries
We propose graph encryption schemes that efficiently support approximate shortest distance
queries on large-scale encrypted graphs. Shortest distance queries are one of the most …
queries on large-scale encrypted graphs. Shortest distance queries are one of the most …
Efficient, oblivious data structures for MPC
We present oblivious implementations of several data structures for secure multiparty
computation (MPC) such as arrays, dictionaries, and priority queues. The resulting oblivious …
computation (MPC) such as arrays, dictionaries, and priority queues. The resulting oblivious …
Secure multiparty PageRank algorithm for collaborative fraud detection
Collaboration between financial institutions helps to improve detection of fraud. However,
exchange of relevant data between these institutions is often not possible due to privacy …
exchange of relevant data between these institutions is often not possible due to privacy …
SecGDB: Graph encryption for exact shortest distance queries with efficient updates
In the era of big data, graph databases have become increasingly important for NoSQL
technologies, and many systems can be modeled as graphs for semantic queries …
technologies, and many systems can be modeled as graphs for semantic queries …
Rpm: Robust anonymity at scale
This work presents RPM, a scalable anonymous communication protocol suite using secure
multiparty computation (MPC) with the offline-online model. We generate random, unknown …
multiparty computation (MPC) with the offline-online model. We generate random, unknown …
A privacy-preserving online ride-hailing system without involving a third trusted server
The increasing popularity of Online Ride-hailing (ORH) services has greatly facilitated our
daily travel. It enables a rider to easily request the nearest driver through mobile devices in a …
daily travel. It enables a rider to easily request the nearest driver through mobile devices in a …
New protocols for secure equality test and comparison
G Couteau - International Conference on Applied Cryptography and …, 2018 - Springer
Protocols for securely comparing private values are among the most fundamental building
blocks of multiparty computation. introduced by Yao under the name millionaire's problem …
blocks of multiparty computation. introduced by Yao under the name millionaire's problem …