Algebraic Techniques for Short(er) Exact Lattice-Based Zero-Knowledge ProofsJonathan BootleVadim Lyubashevskyet al.2019CRYPTO 2019
On Efficiently Processing Workflow Provenance Queries in SparkRajmohan CPranay Kumar Lohiaet al.2019ICDCS 2019
AnonTokens: tracing re-identification attacks through decoy recordsSpiros AntonatosStefano Braghinet al.2019arXiv
Memory Categorization: Separating Attacker-Controlled DataMatthias NeugschwandtnerAlessandro Sorniottiet al.2019DIMVA 2019
Homomorphic Training of 30,000 Logistic Regression ModelsFlavio BergamaschiShai Haleviet al.2019ACNS 2019
Towards deep neural network training on encrypted dataKarthik NandakumarNalini K. Rathaet al.2019CVPRW 2019
Reaching Data Confidentiality and Model Accountability on the CalTrainZhongshu GuHani Jamjoomet al.2019DSN 2019
Promoting Distributed Trust in Machine Learning and Computational Simulation via a Blockchain NetworkKibichii BoreRavi Kiran Ramanet al.2019ICBC 2019
Ensuring Confidentiality in the Cloud of ThingsPatrick EugsterSeema Kumaret al.2019IEEE Pervasive Computing
Challenges for combining smart contracts with trusted computingMarcus BrandenburgerChristian Cachin2018CCS/SysTEX 2018