共 50 条
[31]
Intrusion-resilient secure channels (Extended abstract)
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS,
2005, 3531
:238-253
[32]
New constructions for secure hash functions (Extended abstract)
[J].
FAST SOFTWARE ENCRYPTION,
1998, 1372
:150-167
[33]
Secure Implementations of Typed Channel Abstractions (Extended Abstract)
[J].
CONFERENCE RECORD OF POPL 2007: THE 34TH ACM SIGPLAN SIGACT SYMPOSIUM ON PRINCIPLES OF PROGAMMING LANGUAGES,
2007,
:251-262
[34]
Separating deterministic from nondeterministic NOF multiparty communication complexity - (Extended abstract)
[J].
AUTOMATA, LANGUAGES AND PROGRAMMING, PROCEEDINGS,
2007, 4596
:134-+
[35]
Extended Abstract: Secure and Safe In-Vehicle Device Pairing Using Accelerometer Sensor
[J].
2019 IEEE 90TH VEHICULAR TECHNOLOGY CONFERENCE (VTC2019-FALL),
2019,
[36]
Fast and scalable parallel matrix computations with optical buses (extended abstract)
[J].
PARALLEL AND DISTRIBUTED PROCESSING, PROCEEDINGS,
2000, 1800
:1053-1062
[38]
Using Secure Multiparty Computation for Collaborative Information Exchange
[J].
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013),
2013,
:1717-1722
[39]
One-round secure computation and secure autonomous mobile agents (Extended abstract)
[J].
AUTOMATA LANGUAGES AND PROGRAMMING,
2000, 1853
:512-523
[40]
Protocols for collusion-secure asymmetric fingerprinting (extended abstract)
[J].
STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE,
1997, 1200
:399-412