共 48 条
[31]
Gilboa N, 2014, LECT NOTES COMPUT SC, V8441, P640, DOI 10.1007/978-3-642-55220-5_35
[32]
Software protection and simulation on oblivious RAMs
[J].
JOURNAL OF THE ACM,
1996, 43 (03)
:431-473
[33]
Goldreich O, 1987, P 19 ANN ACM S THEOR, P218, DOI [10.1145/28395.28420, DOI 10.1145/28395.28420]
[34]
Gordon S. Dov, 2012, ACM C COMP COMM SEC, P513
[35]
Safely Measuring Tor
[J].
CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2016,
:1553-1567
[36]
Jawurek Marek, 2012, Privacy Enhancing Technologies. Proceedings 12th International Symposium, PETS 2012, P221, DOI 10.1007/978-3-642-31680-7_12
[37]
Efficient Maliciously Secure Multiparty Computation for RAM
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III,
2018, 10822
:91-124
[39]
Lu S, 2013, LECT NOTES COMPUT SC, V7785, P377, DOI 10.1007/978-3-642-36594-2_22
[40]
Melis Luca, 2016, NDSS