共 50 条
- [1] How to securely broadcast a secret [J]. SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 247 - 257
- [3] SECURELY REPLICATING AUTHENTICATION SERVICES [J]. 9TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, 1989, : 85 - 91
- [4] Secret communication with a fading eavesdropper channel [J]. 2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 1296 - 1300
- [7] Homomorphic Authentication for Computing Securely on Untrusted Machines [J]. SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : XI - XIII
- [8] YOUR PETS SECRET LANGUAGE - HOW TO UNDERSTAND AND SPEAK IT - ROBBINS,J [J]. VERBATIM, 1975, 2 (02): : 15 - 15
- [10] HOW TO SECURELY REPLICATE SERVICES [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1994, 16 (03): : 986 - 1009