Author:
Zhao Qingsong,Liu Ximeng,Xu Huanliang,Li Yanbin
Subject
Law,Hardware and Architecture,Software,General Computer Science,Computer Science Applications
Reference51 articles.
1. Protocols for secure computations;Yao,1982
2. How to generate and exchange secrets;Yao,1986
3. S. Micali, O. Goldreich, A. Wigderson, How to play any mental game, in: Proceedings of the Nineteenth ACM Symp. on Theory of Computing, STOC, 1987, pp. 218–229.
4. The round complexity of secure protocols;Beaver,1990
5. M. Naor, B. Pinkas, R. Sumner, Privacy preserving auctions and mechanism design, in: Proceedings of the 1st ACM Conference on Electronic Commerce, 1999, pp. 129–139.