Author:
Liu Liang,Wu Chunying,Li Shundong
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering
Reference22 articles.
1. A. C. Yao. Protocols for secure computation. In Proceedings of the 23rd IEEE Symposium on Foundations of Computer Science, Chicago, Illinois, USA, Nov. 1982, 160–164.
2. S. Goldwasser. Multi-party computations: past and present. In Proceedings of the 16th annual ACM Symposium on Principles of Distributed Computing, Santa Barbara, California, USA, 1997, 21–24.
3. R. Cramer. Introduction to secure computation. Lectures on Data Security — Modern Cryptology in Theory and Practice, London, Springer-Verlag, 1999, 16–62.
4. O. Goldreich. Foundations of Cryptography: Basic Applications. London, Cambridge University Press, 2004.
5. W. L. Du and M. J. Atallah. Privacy-preserving cooperative scientific computations. In Proceedings of the 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, 2001, 273–282.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献