共 26 条
[1]
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[2]
Secure Multiparty Computations on Bitcoin
[J].
2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014),
2014,
:443-458
[3]
[Anonymous], 2020, 2019 REV DATA BREACH
[4]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]
Bentov I, 2014, LECT NOTES COMPUT SC, V8617, P421, DOI 10.1007/978-3-662-44381-1_24
[6]
New constructions and practical applications for private stream searching - (Extended abstract)
[J].
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2006,
:132-+
[7]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[9]
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[10]
A fair protocol for data trading based on Bitcoin transactions
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2020, 107 (107)
:832-840