共 16 条
[1]
Bar- Noy A., 1991, LNCS, V579, P95
[2]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[3]
Boyle E, 2013, LECT NOTES COMPUT SC, V7785, P356, DOI 10.1007/978-3-642-36594-2_21
[5]
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults
[J].
PROCEEDINGS OF THE 6TH INNOVATIONS IN THEORETICAL COMPUTER SCIENCE (ITCS'15),
2015,
:153-162
[6]
Chaum D., 1988, Advances in Cryptology - CRYPTO '87. Proceedings
[8]
Damgård I, 2013, LECT NOTES COMPUT SC, V7785, P621, DOI 10.1007/978-3-642-36594-2_35
[9]
Data D, 2014, LECT NOTES COMPUT SC, V8617, P199, DOI 10.1007/978-3-662-44381-1_12
[10]
Feige U., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P554, DOI 10.1145/195058.195408