共 50 条
- [41] Secure multi-party computation protocol for sorting problem [J]. Hsi An Chiao Tung Ta Hsueh, 2008, 2 (231-233+255): : 231 - 233
- [44] Minimal Complete Primitives for Secure Multi-Party Computation [J]. Journal of Cryptology, 2005, 18 : 37 - 61
- [45] Application of Secure Multi-party Computation in Linear Programming [J]. 2014 IEEE 7TH JOINT INTERNATIONAL INFORMATION TECHNOLOGY AND ARTIFICIAL INTELLIGENCE CONFERENCE (ITAIC), 2014, : 244 - 248
- [46] Secure multi-party computation protocol for sequencing problem [J]. Science China Information Sciences, 2011, 54 : 1654 - 1662
- [47] Rational protocol of quantum secure multi-party computation [J]. Quantum Information Processing, 2018, 17
- [48] Secure Multi-party Computation Minimizing Online Rounds [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2009, 2009, 5912 : 268 - 286
- [49] Conclave: secure multi-party computation on big data [J]. PROCEEDINGS OF THE FOURTEENTH EUROSYS CONFERENCE 2019 (EUROSYS '19), 2019,
- [50] Secure Multi-Party Computation Using Polarizing Cards [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 281 - 297