Cited By
View all- Kim JPark SLee JCheon JSalakhutdinov RKolter ZHeller KWeller AOliver NScarlett JBerkenkamp F(2024)Privacy-preserving embedding via look-up table evaluation with fully homomorphic encryptionProceedings of the 41st International Conference on Machine Learning10.5555/3692070.3693050(24437-24457)Online publication date: 21-Jul-2024
- Breuer MHein PPompe LMeyer UWetzel S(2024)Prioritization and exchange chains in privacy-preserving kidney exchangeJournal of Computer Security10.3233/JCS-23001232:4(349-404)Online publication date: 26-Aug-2024
- Breuer MMeyer UWetzel SQuek TGao DZhou JCardenas A(2024)Efficient Privacy-Preserving Approximation of the Kidney Exchange ProblemProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3645015(306-322)Online publication date: 1-Jul-2024
- Show More Cited By