Author:
Howlader Jaydeep,Roy Sanjit Kumar,Mal Ashis Kumar
Publisher
Springer International Publishing
Reference30 articles.
1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. Lecture Notes in Computer Science;B Lee,2003
3. Bárász, M., Ligeti, P., Mérai, L., Nagy, D.A.: Anonymous sealed bid auction protocol based on a variant of the dining cryptographers’ protocol. Periodica Math. Hung. 65(2), 167–176 (2012)
4. Boyd, C., Mao, W.: Security issues for electronic auctions. HP Laboratories Technical report, Hewlett-Packard Laboratories (2000)
5. Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, SFCS ’82, pp. 160–164. IEEE Computer Society (1982)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献