共 50 条
- [2] Secure Computation with Information Leaking to an Adversary [J]. STOC 11: PROCEEDINGS OF THE 43RD ACM SYMPOSIUM ON THEORY OF COMPUTING, 2011, : 715 - 724
- [3] Comparing information without leaking it [J]. COMMUNICATIONS OF THE ACM, 1996, 39 (05) : 77 - 85
- [4] Composable, Unconditionally Secure Message Authentication without any Secret Key [J]. 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 622 - 626
- [5] A Secure Authentication and Key Agreement Protocol for Telecare Medicine Information System [J]. 2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 275 - 281
- [7] Secure computation without authentication [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2005, PROCEEDINGS, 2005, 3621 : 361 - 377
- [9] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes [J]. PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 148 - 165
- [10] Pairwise key setup and authentication utilizing deployment information for secure sensor network [J]. HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 280 - 289