共 50 条
- [42] Secure Exams despite Malicious Management 2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2014, : 274 - 281
- [43] Secure Aggregation Against Malicious Users PROCEEDINGS OF THE 26TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2021, 2021, : 115 - 124
- [44] Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT THEORY OF CRYPTOGRAPHY, TCC 2022, PT II, 2022, 13748 : 441 - 469
- [45] Research on the Harmfulness of Malicious Communication of Anonymous Internet Users 2018 3RD ANNUAL INTERNATIONAL CONFERENCE ON EDUCATION SCIENCE AND EDUCATION MANAGEMENT (ESEM 2018), 2018, : 299 - 303
- [47] Secure Computing Protocols for Internet of Things Data Fusion Based on Set Intersection and Union Against Malicious Enemies IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (14): : 24918 - 24932
- [50] Anonymous and secure electronic transaction protocol Annales des Telecommunications/Annals of Telecommunications, 2005, 60 (5-6): : 530 - 557