Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Algesheimer, J., Cachin, C., Camenisch, J., Karjoth, G.: Cryptographic security for mobile code. In: SP 2001: Proceedings of the IEEE Symposium on Security and Privacy, p. 2. IEEE Computer Society Press, Los Alamitos (2001)
2. Barrington, D.A.: Bounded-width polynomial-size branching programs recognize exactly those languages in NC1. In: Proc. 18th ACM Symp. on Theory of Computing, pp. 1–5. ACM Press, New York (1986)
3. Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols. In: Proc. 22nd ACM Symp. on Theory of Computing, pp. 503–513 (1990)
4. Lecture Notes in Computer Science;D. Beaver,2000
5. Lecture Notes in Computer Science;I.F. Blake,2004
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献