Author:
Ambainis Andris,Jakobsson Markus,Lipmaa Helger
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Bellare, M., Rivest, R.: Translucent Cryptography — An Alternative to Key Escrow, and Its Implementation via Fractional Oblivious Transfer. Journal of Cryptology 12(2), 117–139 (1999)
2. Crépeau, C., Kilian, J.: Achieving Oblivious Transfer Using Weakened Security Assumptions (Extended Abstract). In: 29th Annual Symposium on Foundations of Computer Science, White Plains, New York, USA, October 24-26, pp. 42–52. IEEE Computer Society Press, Los Alamitos (1998)
3. Statistics: Textbooks and Monographs;A. Chaudhuri,1988
4. Lecture Notes in Computer Science;C. Crépeau,1997
5. Greenberg, B.G., Abul-Ela, A.-L.A., Simmons, W.R., Horvitz, D.G.: The Unrelated Question Randomized Response Model: Theoretical Framework. Journal of the American Statistical Association 64(326), 520–539 (1969)
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献