共 50 条
- [21] Wiretap Codes for Secure Multi-Party Computation [J]. 2014 GLOBECOM WORKSHOPS (GC WKSHPS), 2014, : 1349 - 1354
- [22] Secure multi-party computation in large networks [J]. DISTRIBUTED COMPUTING, 2017, 30 (03) : 193 - 229
- [23] Realistic Failures in Secure Multi-party Computation [J]. THEORY OF CRYPTOGRAPHY, 6TH THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2009, 2009, 5444 : 274 - 293
- [24] Social rational secure multi-party computation [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2014, 26 (05): : 1067 - 1083
- [26] Malicious Computation Prevention Protocol for Secure Multi-Party Computation [J]. TENCON 2009 - 2009 IEEE REGION 10 CONFERENCE, VOLS 1-4, 2009, : 490 - +
- [27] Towards Efficient Virtual Network Embedding Across Multiple Network Domains [J]. 2014 IEEE 22ND INTERNATIONAL SYMPOSIUM OF QUALITY OF SERVICE (IWQOS), 2014, : 61 - 70
- [28] MULTI-PARTY SECURE COMPUTATION OF MULTI-VARIABLE POLYNOMIALS [J]. BULLETIN OF THE SOUTH URAL STATE UNIVERSITY SERIES-MATHEMATICAL MODELLING PROGRAMMING & COMPUTER SOFTWARE, 2023, 16 (01): : 81 - 95
- [29] Minimal Complete Primitives for Secure Multi-Party Computation [J]. Journal of Cryptology, 2005, 18 : 37 - 61