共 30 条
[2]
[Anonymous], 1991, DISTRIBUTED COMPUTIN
[3]
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[4]
Atallah MJ, 2001, ADV COMPUT, V54, P215
[5]
BEAVER D, 1990, LECT NOTES COMPUT SC, V415, P37
[7]
Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
[8]
Private and Cheating-Free Outsourcing of Algebraic Computations
[J].
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS,
2008,
:240-245
[9]
Chaum D., 1993, Advances in Cryptology - CRYPTO '92. 12th Annual International Cryptology Conference Proceedings, P89
[10]
Choi SG, 2013, LECT NOTES COMPUT SC, V7785, P499, DOI 10.1007/978-3-642-36594-2_28