

Author: Balogh J. Csirik J.A. Ishai Y. Kushilevitz E.
Publisher: Elsevier
ISSN: 0304-3975
Source: Theoretical Computer Science, Vol.306, Iss.1, 2003-09, pp. : 69-84
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content


On private computation in incomplete networks
By Beimel Amos
Distributed Computing, Vol. 19, Iss. 3, 2007-01 ,pp. :


By Wu Hui-Chung James Alex Braunthal Nelson Shieh Jean Azarani Arezou
Journal of the Association for Laboratory Automation, Vol. 8, Iss. 4, 2003-08 ,pp. :



