共 18 条
[1]
Akimanaa R, 2007, 6 WSEAS INT C SOFTW, P63
[2]
Atallah M, 1996, CSDTR96074 PURD U DE
[3]
Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
[4]
Atallah MJ, 2005, LECT NOTES COMPUT SC, V3424, P63
[5]
Atallah MJ, 2001, ADV COMPUT, V54, P215
[6]
Private and Cheating-Free Outsourcing of Algebraic Computations
[J].
SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS,
2008,
:240-245
[7]
Boneh D., 2000, Progress in Cryptology - INDOCRYPT 2000. First International Conference in Cryptology in India. Proceedings (Lecture Notes in Computer Science Vol.1977), P271
[8]
Cao TJ, 2006, LECT NOTES COMPUT SC, V3903, P314
[9]
Chen Y, 2005, SEC MOB AD HOC NETW, P27
[10]
Uncheatable grid computing
[J].
24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS,
2004,
:4-11