共 50 条
- [32] The secure judgment of graphic similarity against malicious adversaries and its applications SCIENTIFIC REPORTS, 2023, 13 (01):
- [33] Asynchronous perfectly secure computation tolerating generalized adversaries INFORMATION SECURITY AND PRIVACY, 2002, 2384 : 497 - 511
- [34] Efficient Private Set Intersection Cardinality in the Presence of Malicious Adversaries PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 : 326 - 339
- [35] Secure Distributed Observers for a Class of Linear Time Invariant Systems in the Presence of Byzantine Adversaries 2016 IEEE 55TH CONFERENCE ON DECISION AND CONTROL (CDC), 2016, : 2709 - 2714
- [36] Secure Maximum (Minimum) Computation in Malicious Model 1600, Science Press (44): : 2076 - 2089
- [38] Feasibility and Infeasibility of Secure Computation with Malicious PUFs ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT II, 2014, 8617 : 405 - 420
- [39] Feasibility and Infeasibility of Secure Computation with Malicious PUFs Journal of Cryptology, 2020, 33 : 595 - 617