Open Access
Issue
ITM Web Conf.
Volume 84, 2026
2026 International Conference on Advent Trends in Computational Intelligence and Data Science (ATCIDS 2026)
Article Number 03032
Number of page(s) 11
Section Large Language Models, Generative AI, and Multimodal Learning
DOI https://doi.org/10.1051/itmconf/20268403032
Published online 06 April 2026
  1. P.L. Tan, T. Xu, S.J. Yang, Z.H. Tao, Review of research on blockchain privacy protection technologies. Appl. Res. Comput. 41, 2261–2269 (2024) [Google Scholar]
  2. F. Bourse, O. Sanders, J. Traoré, Improved secure inte ger comparison via homomorphic encryption, in Proceedings of the Cryptographers’ Track at the RSA Conference (CT-RSA 2020), San Francisco, CA, USA, February 24–28 (2020), B391– 416 [Google Scholar]
  3. S. Wagh, S. et al., Falcon: Honest-majority maliciously secure framework for private deep learning, in Proceedings on Privacy Enhancing Technologies (PETs), Virtual Event, July 12–16 (2021), B188–208 [Google Scholar]
  4. Z. Huang, W. Lu, C. Hong, J. Ding, Cheetah: Lean and fast secure two-party deep neural network inference, in 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, August 10–12 (2022), B809–826 [Google Scholar]
  5. E. Ben-Sasson, A. Chiesa, M. Garman, M. Green, I. Miers, E. Tromer, M. Virza, Zerocash: Decentralized anonymous payments from Bitcoin, in Proceedings of the 2014 IEEE Symposium on Security and Privacy (SP), Berkeley, CA, USA, May 18–21 (2014), B459–474 [Google Scholar]
  6. W. Liu, Z. Liu, K. Nguyen, G. Yang, Y. Yu, A lattice-based key-insulated and privacy-preserving signature scheme with publicly derived public key, in Proceedings of the 25th European Symposium on Research in Computer Security (ESORICS 2020), Part II, Guildford, UK, September 14–18 (2020), B357–377 [Google Scholar]
  7. A. Kothapalli, S. Setty, I. Tzialla, Nova: Recursive zero-knowledge arguments from folding schemes, in Advances in Cryptology – CRYPTO 2022, Santa Barbara, CA, USA, August 15–19 (2022), B359–388 [Google Scholar]
  8. A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, Hawk: The blockchain model of cryptography and privacy-preserving smart contracts, in Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, May 22–26 (2016), B839–858 [Google Scholar]
  9. C. Dwork, Differential privacy, in Proceedings of the 33rd International Colloquium on Automata, Languages and Programming (ICALP), Venice, Italy, July 10–14 (2006), pp. 1–12 [Google Scholar]
  10. J. Zhang, N. Li, H. Chen, Dynamic differential privacy for data streams. IEEE Trans. Knowl. Data Eng. 30, 2314–2328 (2018). [Google Scholar]
  11. S. Bowe, A. Chiesa, M. Green, I. Miers, P. Mishra, H. Wu, ZEXE: Enabling decentralized private computation, in Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA (2020), B947–964 [Google Scholar]
  12. C. Stamatellis, P. Papadopoulos, N. Pitropakis, S. Katsikas, W.J. Buchanan, A privacy-preserving healthcare framework using Hyperledger Fabric. Sensors 20, 6587 (2020) [Google Scholar]
  13. T. Liu, et al., Pianist: Scalable zkRollups via fully distributed zero-knowledge proofs, in Proceedings of the 45th IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, May 20–23 (2024), B1777–1793 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.