共 50 条
- [21] Wiretap Codes for Secure Multi-Party Computation 2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
- [22] Realistic Failures in Secure Multi-party Computation THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
- [23] Social rational secure multi-party computation CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
- [25] Secure Multi-party Computation and Its Applications INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 3 - 5
- [27] Malicious Computation Prevention Protocol for Secure Multi-Party Computation TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
- [28] Towards Efficient Virtual Network Embedding Across Multiple Network Domains 2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 61 - 70
- [29] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
- [30] Minimal Complete Primitives for Secure Multi-Party Computation Journal of Cryptology, 2005, 18 : 37 - 61