共 50 条
- [3] Secure blockchain bidding auction protocol against malicious adversaries [J]. HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):
- [5] The secure judgment of graphic similarity against malicious adversaries and its applications [J]. SCIENTIFIC REPORTS, 2023, 13 (01):
- [7] An efficient protocol for secure two-party computation in the presence of malicious adversaries [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2007, 2007, 4515 : 52 - +
- [8] An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries [J]. Journal of Cryptology, 2015, 28 : 312 - 350
- [9] POOL: Scalable On-Demand Secure Computation Service Against Malicious Adversaries [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 245 - 257