共 56 条
[1]
Achlioptas D, 2000, SEVENTEENTH NATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AAAI-2001) / TWELFTH INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE (IAAI-2000), P256
[2]
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[3]
Agrawal D., 2001, PROC 20 ACM SIGMOD S, P247, DOI [10.1145/375551.375602, DOI 10.1145/375551.375602]
[4]
Agrawal R, 2000, SIGMOD REC, V29, P439, DOI 10.1145/335191.335438
[5]
[Anonymous], 2000, Foundations of Cryptography: Basic Tools
[6]
[Anonymous], 1990, Cryptology and Computational Number Theory, DOI 10.1090/psapm/042
[7]
Benaloh J., 1994, Advances in Cryptology - EUROCRYPT '93. Workshop on the Theory and Application of Cryptographic Techniques Proceedings, P274
[8]
Blakley G. R., 1985, Proceedings of the 1985 Symposium on Security and Privacy (Cat. No. 85CH2150-1), P116
[9]
Blum M., 1985, P ADV CRYPTOLOGY, P289