共 50 条
- [21] Reasoning about minimal anonymity in security protocols FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 828 - 842
- [22] Improved yoking proof protocols for preserving anonymity International Journal of Information Security, 2018, 17 : 379 - 393
- [25] Constrained Hitting Set Problem with Intervals COMPUTING AND COMBINATORICS (COCOON 2021), 2021, 13025 : 604 - 616
- [28] Reconstructive dispersers and hitting set generators APPROXIMATION, RANDOMIZATION AND COMBINATORIAL OPTIMIZATION: ALGORITHMS AND TECHNIQUES, 2005, 3624 : 460 - 471