Publisher
Springer Berlin Heidelberg
Reference19 articles.
1. Adleman, L. “Subexponential Algorithm for The Discrete Logarithm Problem.” Proc. 20thIEEE Symp. on Foundations of Computer Science, San Juan, PR (Oct. 1979), 55–60.
2. Asmuth, C. and Bloom, J. “A Modular Approach to Key Safeguarding.” Texas A&M University, Departement of Mathematics, College Station, TX (1980).
3. Benaloh, J. and Yung, M. “Distributing the Power of a Government to Enhance the Privacy of Voters.” Proc. 5thACM Symp. on Principles of Distributed Computing, Calgary, AB (Aug. 1986).
4. Blakley, G. “Safeguarding Cryptographic Keys.” Proc. AFIPS 1979 National Computer Conference, New York, NY (June 1979), 313–317.
5. Blakley, G. and Meadows, C. “A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted Data.” Proc. IEEE Symposium on Computer Security and Privacy, Oakland, CA (Apr. 1985).
Cited by
99 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献