共 50 条
- [31] Non-Interactive and secure outsourcing of PCA-Based face recognition Ren, Yanli (renyanli@shu.edu.cn), 1600, Elsevier Ltd (110):
- [32] Mobile agent protection based on non-interactive secure function evaluation Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2004, 38 (07): : 848 - 850
- [33] A secure non-interactive deniable authentication protocol based on discrete logarithms ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
- [38] A Secure Non-interactive Deniable Authentication Protocol with Certificates Based on Elliptic Curve Cryptography NEW TRENDS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS, 2015, 598 : 183 - 190
- [39] Game-based security proofs for verifiable secret sharing schemes in the standard model INFORMATION SECURITY JOURNAL, 2023, 32 (03): : 163 - 172
- [40] Distillation of unconditionally-secure secret-key against active adversaries based on smooth entropy 2001, Chinese Institute of Electronics (29): : 1349 - 1351