Author:
Benkaouz Yahya,Erradi Mohammed
Publisher
Springer Science and Business Media LLC
Subject
Computational Mathematics,Computational Theory and Mathematics,Computer Science Applications,Numerical Analysis,Theoretical Computer Science,Software
Reference30 articles.
1. Applebaum B, Ringberg H, Freedman MJ, Caeser M, Rexford J (2010) Collaborative, privacy-preserving data aggregation at scale. In: Proceedings of the 10th international conference on Privacy enhancing technologies (PETS’10), Springer, Berlin, pp 56–74
2. Oualha N, Roudier Y (2010) Peer-to-peer storage: security and protocols. Nova Science Publishers, New York (August 1 2010)
3. Goldwasser S (1997) Multi party computations: past and present. In: Proceedings of the sixteenth annual ACM symposium on Principles of distributed computing (PODC’97), ACM, New York
4. Yao AC (1982) Protocols for secure computations. In: Proceedings of the 23rd annual symposium on foundations of computer science (SFCS’82), IEEE Computer Society, Washington, DC, pp 160–164
5. Pfitsmann B, Waidner M (1992) Unconditionally untraceable and fault-tolerant broadcast and secret ballot election. In: Communications of the ACM 21(21):7–8
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献