共 50 条
- [33] High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority ADVANCES IN CRYPTOLOGY - EUROCRYPT 2017, PT II, 2017, 10211 : 225 - 255
- [35] Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2183 - 2200
- [36] Peer-to-peer secure multi-party numerical computation facing malicious adversaries Peer-to-Peer Networking and Applications, 2010, 3 : 129 - 144
- [38] Efficient and Malicious Secure Three-Party Private Set Intersection Computation Protocols for Small Sets Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2286 - 2298
- [39] Anonymous and secure multicast subscription RESEARCH DIRECTIONS IN DATA AND APPLICATIONS SECURITY, 2003, 128 : 313 - 327
- [40] Secure and anonymous multicast framework COMMUNICATIONS AND MULTIMEDIA SECURITY ISSUES OF THE NEW CENTURY, 2001, 64 : 39 - 51