共 39 条
- [1] [Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
- [2] [Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2508859.2516738
- [3] [Anonymous], 2015, 22 ANN NETW DISTR SY
- [4] Baum C., 2016, IACR CRYPTOLOGY EPRI
- [5] Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
- [6] Beaver D., 1992, ADV CRYPTOLOGY CRYPT
- [7] Bendlin R, 2011, LECT NOTES COMPUT SC, V6632, P169, DOI 10.1007/978-3-642-20465-4_11
- [9] Bogdanov D., 2015, IACR CRYPTOLOGY EPRI
- [10] How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation [J]. Financial Cryptography and Data Security (FC 2015), 2015, 8975 : 227 - 234