搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Yehuda Lindell , Benny Pinkas
DOI:
关键词: Computer security 、 Secure multi-party computation 、 Secure two-party computation 、 Protocol (object-oriented programming) 、 Computer science 、 Divide and choose 、 Commitment scheme
摘要:
暂无可下载资源,当前可以选择系统获取到有开放资源时 通知我或者直接发起求助 文献求助
,2009, 引用: 1
international conference information security theory and practice,2012, 引用: 0
Algorithms and theory of computation handbook,2010, 引用: 9
,2014, 引用: 0
,2006, 引用: 0
Transactions on Data Privacy,2011, 引用: 9
Applied Cryptography and Network Security,2014, 引用: 36
Lecture Notes in Computer Science,2012, 引用: 1
,2011, 引用: 6
,2011, 引用: 28