Author:
Aspnes James,Diamadi Zoë,Yampolskiy Aleksandr,Gjøsteen Kristian,Peralta René
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference45 articles.
1. M. Abe, Mix-networks on permutation networks, in Advances in Cryptology-ASIACRYPT ’99. Lecture Notes in Computer Science, vol. 1706 (Springer-Verlag, Berlin, 1999), pp. 258–273
2. J. Algesheimer, J. Camenisch, V. Shoup, Efficient computation modulo a shared secret with applications to the generation of shared safe prime products, in Advances in Cryptology-Proceedings of CRYPTO 2002. Lecture Notes in Computer Science, vol. 2442 (Springer-Verlag, Berlin, 2002), pp. 417–432
3. E. Barker, W. Barker, W. Burr, W. Polk, M. Smid, Recommendation for key management. Part 1: (revised March 2007) (National Institute of Standards and Technology, Gaithersburg, 2007)
4. A. Beimel, S. Dolev, Buses for anonymous message delivery, in Second International Conference on FUN with Algorithms (Carleton Scientific, Ottawa, 2001), pp. 1–13
5. I.F. Blake, G. Seroussi, N.P. Smart, Elliptic Curves in Cryptography. London Mathematical Society Lecture Note Series, vol. 265 (Cambridge University Press, Cambridge, 1999)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks;Lecture Notes in Computer Science;2019
2. Spreading Alerts Quietly;Proceedings of the 13th International Conference on Availability, Reliability and Security;2018-08-27