共 18 条
[1]
Abraham I, 2008, LECT NOTES COMPUT SC, V4948, P302, DOI 10.1007/978-3-540-78524-8_17
[3]
Cleve R., 1986, P 18 ANN ACM S THEOR, P364, DOI DOI 10.1145/12130.12168
[4]
Dodis Y, 2007, ALGORITHMIC GAME THEORY, P181
[5]
FUCHSBAUER G, 2008, 2008488 CRYPT EPRINT
[6]
Gordon SD, 2006, LECT NOTES COMPUT SC, V4116, P229
[7]
Halpern J., 2004, P 36 ANN ACM S THEOR, P623
[8]
Ittai Abraham, 2006, P 25 ANN ACM S PRINC, P188, DOI [DOI 10.1145/1146381.1146411, 10.1145/1146381.1146393, 10.1145/1146381.1146411.8,31, DOI 10.1145/1146381.1146411.8,31]
[9]
Rational secure computation and ideal mechanism design
[J].
46th Annual IEEE Symposium on Foundations of Computer Science, Proceedings,
2005,
:585-594
[10]
Katz J, 2003, LECT NOTES COMPUT SC, V2656, P578