共 43 条
[1]
Aggarwal CC, 2008, ADV DATABASE SYST, V34, P1, DOI 10.1007/978-0-387-70992-5
[2]
[Anonymous], 2002, ACM Sigkdd Explorations Newsletter, DOI [10.1145/772862.772867, DOI 10.1145/772862.772867]
[3]
BEAVER D, 1990, PROCEEDINGS OF THE TWENTY SECOND ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, P503, DOI 10.1145/100216.100287
[4]
Ben-David A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P257
[5]
Boneh D., 1998, Algorithmic Number Theory. Third International Symposium, ANTS-III. Proceedings, P48, DOI 10.1007/BFb0054851
[6]
Castelluccia C, 2005, PROCEEDINGS OF MOBIQUITOUS 2005, P109
[8]
Chan T.-H. H., 2012, International Conference on Financial Cryptography and Data Security, P200
[9]
Chen X., 2014, P IEEE C COMP COMM
[10]
Dwork C, 2006, LECT NOTES COMPUT SC, V4052, P1

