共 45 条
[1]
Alwen J, 2008, LECT NOTES COMPUT SC, V5157, P497, DOI 10.1007/978-3-540-85174-5_28
[2]
Aly A., 2013, Financial Cryptography, P239
[3]
Secure Centrality Computation Over Multiple Networks
[J].
PROCEEDINGS OF THE 26TH INTERNATIONAL CONFERENCE ON WORLD WIDE WEB (WWW'17),
2017,
:957-966
[5]
AWERBUCH B, 1987, IEEE T COMPUT, V36, P1258, DOI 10.1109/TC.1987.1676869
[6]
Privacy-Preserving Planarity Testing of Distributed Graphs
[J].
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXII, DBSEC 2018,
2018, 10980
:131-147
[7]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[8]
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[9]
Boyer John M, 2004, J GRAPH ALGORITHMS A, V8, P241, DOI DOI 10.7155/jgaa.00091
[10]
Brickell J, 2005, LECT NOTES COMPUT SC, V3788, P236