搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Andrew C Yao , None
DOI: 10.1109/SFCS.1982.38
关键词:
摘要: … view of secure computation in the … protocol, any cheating will be discovered if there is a verification stage afterwards where both parties are required to reveal all their private computation…
theory and application of cryptographic techniques,1987, 引用: 44
Applied Cryptography and Network Security,2014, 引用: 22
Data Privacy Management and Autonomous Spontaneous Security,2014, 引用: 8
Theory of Cryptography,2013, 引用: 105
privacy forum,2014, 引用: 17
Frequent Pattern Mining,2014, 引用: 4
Computational Science and Its Applications - ICCSA 2011,2011, 引用: 0
Provable Security,2011, 引用: 9
,1998, 引用: 0
,1994, 引用: 1