共 34 条
- [1] Aho A.V., Hirschberg D.S., Ullman J.D., Bounds on the complexity of the longest common subsequence problem, J. ACM, 23, 1, pp. 1-12, (1976)
- [2] Atallah M.J., Kerschbaum F., Du W., Secure and private sequence comparisons, 2nd ACM Workshop on Privacy in Electronic Society, (2003)
- [3] Atallah M.J., Li J., Secure outsourcing of sequence comparisons, 4th Workshop on Privacy Enhancing Technologies, (2004)
- [4] Atallah M.J., Pantazopoulos K.N., Rice J., Spafford E.H., Secure outsourcing of scientific computations, Adv. Comput., 54, 6, pp. 215-272, (2001)
- [5] Beguin P., Quisquater J.J., Fast server-aided RSA signatures secure against active attacks, Advances in Cryptology - Crypto 1995, 963, pp. 57-69, (1995)
- [6] Boneh D., Crescenzo G.D., Ostrovsky R., Persiano P., Public-key encryption with keyword search, Advances in Cryptology - Eurocrypt 2004, 3027, pp. 506-522, (2004)
- [7] Cachin C., Efficient private bidding and auctions with an oblivious third party, 6th ACM Conference on Computer and Communications Security, pp. 120-127, (1999)
- [8] Du W., Atallah M.J., Protocols for secure remote database access with approximate matching, 1st ACM Workshop on Security and Privacy in E-commerce, (2000)
- [9] Fischlin M., A cost-effective pay-per-multiplication comparison method for millionaires, RSA Security 2001 Cryptographer's Track, 2020, pp. 457-471, (2001)
- [10] Foster I., Kesselman C., The grid: Blueprint for a new computing infrastructure, (1999)