Author:
Li Hong-Da,Ji Dong-Yao,Feng Deng-Guo,Li Bao
Publisher
Springer Science and Business Media LLC
Subject
Computational Theory and Mathematics,Computer Science Applications,Hardware and Architecture,Theoretical Computer Science,Software
Reference24 articles.
1. Andrew C Yao. Protocols for secure computations. InProc. 23rd FOCS, New York, 1982, pp.160–164.
2. Canetti R. Security and composition of multi-party cryptographic protocols.Journal of Cryptology, 2000, 13(1): 143–202.
3. Canetti R. Universally composable security: A new paradigm for cryptographic protocols. http://eprint. iacr. org/2000/067.
4. Canetti R. Studies on secure multi-party computation and applications [Dissertation]. ftp://theory.lcs. mit.edu/pub/tcryptol/B03/thesis.ps.Z.
5. Canetti R, Feige U, Goldreich O, Naor M. Adaptively secure multi-party computation. InProc. 28th ACM Symp. Theory of Computing, Pennsylvania, USA, 1996, pp.639–648.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献