共 30 条
[1]
[Anonymous], P 23 ANN JOINT C IEE
[2]
[Anonymous], P 26 IEEE INT C DIST
[3]
Asmuth C. A., 1982, Proceedings of the 1982 Symposium on Security and Privacy, P156
[4]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[5]
Bellare M., 1996, Advances in Cryptology - CRYPTO'96. 16th Annual International Cryptology Conference. Proceedings, P1
[6]
BHATNAGAR N, 2007, P ACM WORKSH STOR SE, P19
[7]
BLUNDO C, 1992, P 12 ANN INT CRYPT C, V740, P471
[8]
CHESSA S, 2001, P 1 IFIP TC6 WORK C, P184
[9]
Desnoyers P., 2005, PROCEEDING SENSYS, P39
[10]
Feldman Paul., 1987, A Practical Scheme for Non-interactive Verifiable Secret Sharing Paul Feldman, P427