共 51 条
[1]
Data outlier detection using the Chebyshev theorem
[J].
2005 IEEE Aerospace Conference, Vols 1-4,
2005,
:3814-3819
[2]
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier
[J].
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2017,
:843-862
[3]
Attias V., 2020, Implementation study of two verifiable delay functions
[4]
Behrisch M., 2011, SIMUL
[5]
Boneh D., 2018, Advances in CryptologyCRYPTO, P788
[7]
Hardening Distributed and Encrypted Keyword Search via Blockchain
[J].
2017 1ST IEEE SYMPOSIUM ON PRIVACY-AWARE COMPUTING (PAC),
2017,
:119-128
[10]
Cohda Wireless, 2015, Cohda Mobility MK5 Module Datasheet