共 50 条
- [21] A new two-party bargaining mechanism [J]. Journal of Combinatorial Optimization, 2013, 25 : 135 - 163
- [22] On the Complexity of Two-Party Differential Privacy [J]. PROCEEDINGS OF THE 54TH ANNUAL ACM SIGACT SYMPOSIUM ON THEORY OF COMPUTING (STOC '22), 2022, : 1392 - 1405
- [23] The Limits of Two-Party Differential Privacy [J]. 2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, : 81 - 90
- [24] Efficient Secure Two-Party Exponentiation [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2011, 2011, 6558 : 17 - +
- [25] Secure two-party computational geometry [J]. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2005, 20 (02) : 258 - 263
- [27] Contracts for Interacting Two-Party Systems [J]. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2012, (94): : 21 - 30
- [28] Secrecy of two-party secure computation [J]. DATA AND APPLICATIONS SECURITY XIX, PROCEEDINGS, 2005, 3654 : 114 - 123
- [29] On the Power of Secure Two-Party Computation [J]. ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT II, 2016, 9815 : 397 - 429
- [30] Secure Two-Party Computational Geometry [J]. Journal of Computer Science and Technology, 2005, 20 : 258 - 263