共 50 条
- [43] Two-Output Secure Computation with Malicious Adversaries ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 386 - 405
- [44] Secure computation of common data among malicious partners SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 345 - 354
- [45] Secure anonymous union computation among malicious partners ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 128 - +
- [46] Secure linear system computation in the presence of malicious adversaries Science China Information Sciences, 2014, 57 : 1 - 10
- [48] Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation Journal of Ambient Intelligence and Humanized Computing, 2019, 10 : 429 - 438
- [49] Outsourcing computation of modular exponentiations in cloud computing CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 787 - 796
- [50] Outsourcing computation of modular exponentiations in cloud computing Cluster Computing, 2013, 16 : 787 - 796