Author:
Zhang Xinyu,Liu YuJun,Chen Yuling,Wang Zhan
Publisher
Springer International Publishing
Reference23 articles.
1. Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(379–423), 623–656 (1948)
2. Yao, A.C.: Protocols for secure computation. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 160–164. IEEE (1982)
3. Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, pp. 218–229. ACM (1987)
4. Lecture Notes in Computer Science;G Asharov,2013
5. Wang, Y., Zhao, C., Xu, Q., et al.: Fair secure computation with reputation assumptions in the mobile social networks. Mobile Inf. Syst. 1–8 (2015)