[1] Yao A.Protocols for secure computations[A].E Kushilevitz.Proceedings of the 23th IEEE Symposium on Foundations of Computer Science[C].Chicago:IEEE Press,1982.160-164.
[2] Goldreich O,et al.How to play any mental game[A].Alfred V.Aho.Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing[C].New York:ACM,1987.218-229.
[3] Goldreich O.Foundations of Cryptography:Basic Applications[M].London:Cambridge University Press,2004.599-764.
[4] Yasin S,et al.Cryptography based e-commerce security:a review[J].International Journal of Computer Science Issues,2012,9(2):132-137.
[5] Sharma R.Review paper on cryptography[J].International Journal of Research,2015,2(5):141-142.
[6] Kumar S N.Review on network security and cryptography[J].Science and Education,2015,3(1):1-11.
[7] Du W L,Atallah J.Secure multi-party computation problems and their applications:A review and open problems[A].B Timmerman.New Security Paradigms Workshop 2001[C].New York,USA:ACM,2001.11-20.
[8] Atallah M J,Du W.Secure Multi-party Computational Geometry[M].Berlin:Springer Berlin Heidelberg,2001.165-179.
[9] Li S D,DAI Y Q.Secure two-party computational geometry[J].Journal of Computer Science and Technology,2005,20(2):258-263.
[10] Li S D,WU C Y,et al.Secure multiparty computation of solid geometric problems and their applications[J].Information Sciences,2014,282:401-413.
[11] Li S D,Dai Y Q,et al.A secure multi-party computation solution to intersection problems of sets and rectangles[J].Progress in Natural Science,2006,16(5):538-545.
[12] Liu L,Chen X,Lou W.Secure three-party computational protocols for triangle area[J].International Journal of Information Security,2016,15(1):1-13.
[13] 王涛春,罗永龙,等.多边形相似判定中的私有信息保护[J].小型微型计算机系统,2012,33(2):383-387. Wang T C,Luo Y L,et al.Privacy-preserving in the determination of polygonal similarity[J].Journal of Chinese Computer Systems,2012,33(2):383-387.(in Chinese)
[14] 祝晓晖.基于几何图形相似仿真系统的设计与实现[D].四川:电子科技大学,2012. Zhu X H.The Design and Implementation of Simulation System Based on Geometry Similarity[D].Sichuan:University of Electronic Science and Technology of China,2012.
[15] Ionescu A,Leiss E L.On the role of complementation in implicit language equations and relations[J].Journal of Computer and System Sciences,2014,80(2):457-467.
[16] Li S D,Wang D S,Dai Y Q.Efficient secure multiparty computational geometry[J].Chinese Journal of Electronics,2010,19(2):324-328. |