1. Yao A C 1982 Proceeding of the 23th IEEE Symposium on Foundations of Computer Science Los Alamitos, CA, November 3—5, 1982 p160
2. Cachin C 1999 Proceedings of the 6th ACM Conference on Computer and Communications Security Kent Ridge Digital Labs, Singapore November 3—5, 1999 p120
3. Lin H Y, Tzeng W G 2005 Proceedings of the 4th International Conference on Applied Cryptography and Networks Security Singapore, June 6—9, 2006 p456
4. Qin B, Qin H, Zhou K F, Wang X F, Wang Y M 2005 Journal of Xi'an University of Technology 21 149 (in Chinese)[秦 波、秦 慧、周克复、王晓峰、王育民 2005 西安理工大学学报 21 149]
5. Ioannidis I, Grama A 2003 Proceedings of the 36th Annual Hawaii International Conference on System Sciences Big Island, HI, USA, January 6—9, 2003 p2005