共 13 条
[1]
BELLARE M, 2007, ACM C COMP COMM SEC, P172
[2]
Fujisaki E., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P260
[3]
Gordon SD, 2006, LECT NOTES COMPUT SC, V4116, P229
[4]
Halpern J., 2004, P THIRTYSIXTH ANN AC, P623, DOI [DOI 10.1145/1007352.1007447, 10.1145/1007352.1007447]
[5]
Ittai Abraham, 2006, P 25 ANN ACM S PRINC, P188, DOI [DOI 10.1145/1146381.1146411, 10.1145/1146381.1146393, 10.1145/1146381.1146411.8,31, DOI 10.1145/1146381.1146411.8,31]
[6]
IZMALKOV S, 2004, P 36 ANN ACM S THEOR, P585
[7]
KOL G, 2008, P 40 ANN ACM S THEOR, P423
[8]
Kol G, 2008, LECT NOTES COMPUT SC, V4948, P320, DOI 10.1007/978-3-540-78524-8_18
[9]
Lepinksi M., 2005, STOC 05 P 37 ANN ACM, P543
[10]
Lepinski M., 2004, ACM S PRINC DISTR CO, P1