Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Hardware and Architecture,Theoretical Computer Science
Reference31 articles.
1. Beimel A., Franklin M. (1999): Reliable communication over partially authenticated networks. Theoret. Comput. Sci. 220, 185–210
2. Beimel A., Malka L. (2005): Efficient reliable communication over partially authenticated networks. Distrib. Comput. 18(1): 1 – 19
3. Ben-Or, M., Goldwasser, S., Wigderson, A.: theorems for noncryptographic fault-tolerant distributed computations. In: Proceedings of the 20th ACM Symposium on the Theory of Computing, pp. 1–10 (1988)
4. Bläser, M., Jakoby, A., Liśkiewicz, M., Manthey, B.: Private computation – k-connected versus 1-connected networks. In: Advances in Cryptology—CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442, pp. 194–209. Springer, Heidelberg New York (2002). Journal version: J. Cryptol. 19(3), 341–357, (2006)
5. Bläser, M., Jakoby, A., Liśkiewicz, M., Manthey, B.: Privacy in non-private environments. In: Advances in Cryptology—ASIACRYPT 2004, Lecture Notes in Computer Science, vol. 3329, pp. 137 – 151. Springer, Berlin Heidelberg New York (2004)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Topology-Dependent Privacy Bound for Decentralized Federated Learning;ICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP);2024-04-14
2. Must the Communication Graph of MPC Protocols be an Expander?;Journal of Cryptology;2023-05-10
3. Interactive Secure Function Computation;IEEE Transactions on Information Theory;2020-09
4. Convex Optimisation-Based Privacy-Preserving Distributed Average Consensus in Wireless Sensor Networks;ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP);2020-05
5. Is Information-Theoretic Topology-Hiding Computation Possible?;Theory of Cryptography;2019