共 27 条
- [1] [Anonymous], 2011, Algorithms
- [2] Bektas A., 2013, THESIS MIDDLE E TU N
- [3] Ben-David A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P257
- [4] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
- [5] Bogdanov D., 2008, IACR CRYPTOL EPRINT, V2008, P289
- [6] Bogdanov Dan., 2012, INT C FINANCIAL CRYP, P57
- [7] Bogetoft P, 2009, LECT NOTES COMPUT SC, V5628, P325, DOI 10.1007/978-3-642-03549-4_20
- [8] Brandt F, 2005, LECT NOTES COMPUT SC, V3570, P298
- [10] Chaum D., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P11, DOI 10.1145/62212.62214