Publisher
Springer Science and Business Media LLC
Subject
History and Philosophy of Science,General Mathematics
Reference5 articles.
1. D. Beaver, Perfect privacy for two-party protocols,Harvard Tec. Report TR-11-89, Aiken Computer Laboratory.
2. M. Ben-Or, S. Goldwasser, and A. Wigderson, Completeness theorems for non-cryptographic fault tolerant distributed computations,Proceedings 20th STOC (1988), 1–10.
3. D. Chaum, C. Crépeau, and I. Damgard, Multiparty unconditionally secure protocols,Proceedings 20th STOC (1988), 11–19.
4. B. Chor and E. Kushilevitz, A zero-one law for Boolean privacy,Proceedings 21st STOC (1989), 62–72.
5. A. C. Yao, Protocols for secure computation,Proceedings FOCS (1982), 160–164.
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献