Publisher
Springer Berlin Heidelberg
Reference62 articles.
1. Lecture Notes in Computer Science;G. Asharov,2012
2. Ben-Or, M., Canetti, R., Goldreich, O.: Asynchronous secure computation. In: Proceedings of the Twenty-Fifth ACM Symposium on the Theory of Computing (STOC) (1993)
3. Boyle, E., Chung, K.-M., Pass, R.: Large-scale secure computation. Cryptology ePrint Archive, Report 2014/404 (2014)
4. Boyle, E., Chung, K.-M., Pass, R.: Oblivious parallel ram. Cryptology ePrint Archive, Report 2014/594 (2014)
5. Burkhart, M., Dimitropoulos, X.: Fast privacy-preserving top-k queries using secret sharing. In: Proceedings of 19th International Conference on Computer Communications and Networks (ICCCN), pp. 1–7 (2010)
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献