Revisiting Colored Networks and Privacy Preserving Censorship
暂无分享,去创建一个
[1] Matthew K. Franklin,et al. Secure Communications in Minimal Connectivity Models , 1998, EUROCRYPT.
[2] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[3] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[4] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[5] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[6] Nancy A. Lynch,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[7] Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
[8] Yvo Desmedt,et al. Is hierarchical public-key certification the next target for hackers? , 2004, CACM.
[9] Yongge Wang,et al. A Complete Characterization of Tolerable Adversary Structures for Secure Point-to-Point Transmissions Without Feedback , 2005, ISAAC.
[10] Amos Beimel,et al. Efficient reliable communication over partially authenticated networks , 2004, Distributed Computing.
[11] Matthew K. Franklin,et al. Secure Hypergraphs: Privacy from Partial Broadcast , 2004, SIAM J. Discret. Math..
[12] Reihaneh Safavi-Naini,et al. Radio Networks with Reliable Communication , 2005, COCOON.
[13] Matthew K. Franklin,et al. Reliable Communication over Partially Authenticated Networks , 1999, Theor. Comput. Sci..
[14] Vassos Hadzilacos,et al. Issues of fault tolerance in concurrent computations (databases, reliability, transactions, agreement protocols, distributed computing) , 1985 .
[15] Yongge Wang,et al. Efficient Zero-Knowledge Proofs for Some Practical Graph Problems , 2002, SCN.
[16] Jacques Stern,et al. Advances in Cryptology — EUROCRYPT ’99 , 1999, Lecture Notes in Computer Science.
[17] K. Srinathan,et al. On perfectly secure communication over arbitrary networks , 2002, PODC '02.
[18] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.
[19] Yongge Wang,et al. Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Question , 1999, EUROCRYPT.
[20] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[21] Kaisa Nyberg,et al. Advances in Cryptology — EUROCRYPT'98 , 1998 .
[22] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[23] Silvio Micali,et al. The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..
[24] Aggelos Kiayias,et al. Traitor Tracing with Constant Transmission Rate , 2002, EUROCRYPT.
[25] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .