A TWO-PARTY SOUTH?

被引:0
|
作者
Heberle, Rudolf
机构
关键词
D O I
10.2307/2572582
中图分类号
C91 [社会学];
学科分类号
030301 ; 1204 ;
摘要
引用
收藏
页码:84 / 85
页数:2
相关论文
共 50 条
  • [21] A new two-party bargaining mechanism
    Y. H. Gu
    M. Goh
    Q. L. Chen
    R. D. Souza
    G. C. Tang
    [J]. Journal of Combinatorial Optimization, 2013, 25 : 135 - 163
  • [22] On the Complexity of Two-Party Differential Privacy
    Haitner, Iftach
    Mazor, Noam
    Silbak, Jad
    Tsfadia, Eliad
    [J]. PROCEEDINGS OF THE 54TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '22), 2022, : 1392 - 1405
  • [23] The Limits of Two-Party Differential Privacy
    McGregor, Andrew
    Mironov, Ilya
    Pitassi, Toniann
    Reingold, Omer
    Talwar, Kunal
    Vadhan, Salil
    [J]. 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 81 - 90
  • [24] Efficient Secure Two-Party Exponentiation
    Yu, Ching-Hua
    Chow, Sherman S. M.
    Chung, Kai-Min
    Liu, Feng-Hao
    [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 17 - +
  • [25] Secure two-party computational geometry
    Li, SD
    Dai, YQ
    [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2005, 20 (02) : 258 - 263
  • [26] The tyranny of the two-party system.
    Pederson, WD
    [J]. LIBRARY JOURNAL, 2002, 127 (12) : 100 - 100
  • [27] Contracts for Interacting Two-Party Systems
    Pace, Gordon J.
    Schapachnik, Fernando
    [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2012, (94): : 21 - 30
  • [28] Secrecy of two-party secure computation
    Chiang, YT
    Wang, DW
    Liau, CJ
    Hsu, TS
    [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
  • [29] On the Power of Secure Two-Party Computation
    Hazay, Carmit
    Venkitasubramaniam, Muthuramakrishnan
    [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
  • [30] Secure Two-Party Computational Geometry
    Shun-Dong Li
    Yi-Qi Dai
    [J]. Journal of Computer Science and Technology, 2005, 20 : 258 - 263