共 50 条
- [21] A Secure Scalar Product Protocol Against Malicious Adversaries Journal of Computer Science and Technology, 2013, 28 : 152 - 158
- [24] Efficient Set Operations in the Presence of Malicious Adversaries Journal of Cryptology, 2012, 25 : 383 - 433
- [26] Efficient secure linear algebra in the presence of covert or computationally unbounded adversaries ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 481 - +
- [27] Securing mobile auctions in the presence of malicious adversaries 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 433 - 437
- [28] Efficient Set Operations in the Presence of Malicious Adversaries PUBLIC KEY CRYPTOGRAPHY - PKC 2010, PROCEEDINGS, 2010, 6056 : 312 - +
- [30] Secure blockchain bidding auction protocol against malicious adversaries HIGH-CONFIDENCE COMPUTING, 2024, 4 (03):