共 39 条
[1]
[Anonymous], 1987, P 19 ANN ACM S THEOR, DOI DOI 10.1145/28395.28420
[2]
[Anonymous], 2013, ACM CCS 2013, DOI DOI 10.1145/2508859.2516738
[3]
[Anonymous], 2015, 22 ANN NETW DISTR SY
[4]
Baum C., 2016, IACR CRYPTOLOGY EPRI
[5]
Beaver D., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P479, DOI 10.1145/237814.237996
[6]
Beaver D., 1992, ADV CRYPTOLOGY CRYPT
[7]
Bendlin R, 2011, LECT NOTES COMPUT SC, V6632, P169, DOI 10.1007/978-3-642-20465-4_11
[9]
Bogdanov D., 2015, IACR CRYPTOLOGY EPRI
[10]
How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation
[J].
Financial Cryptography and Data Security (FC 2015),
2015, 8975
:227-234