http://ir.sinica.edu.tw/handle/201000000A/39053
DC Field | Value | Language |
---|---|---|
dc.contributor | 資訊科學研究所 | - |
dc.contributor.author | Y.T. Chiang | - |
dc.contributor.author | D.W. Wang | - |
dc.contributor.author | C.J. Liau | - |
dc.contributor.author | T.-s. Hsu | - |
dc.date.accessioned | 2020-10-23T02:17:52Z | - |
dc.date.available | 2020-10-23T02:17:52Z | - |
dc.date.issued | 2005-08 | - |
dc.identifier.uri | http://ir.sinica.edu.tw/handle/201000000A/39053 | - |
dc.description.sponsorship | 資訊科學研究所 | - |
dc.language.iso | en | - |
dc.title | Secrecy of two-party secure computation | - |
dc.type | conference paper | - |
dc.relation.conference | Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec 2005) (Storrs, CT, USA) | - |
dc.description.note | 已出版;有審查制度;具代表性 | - |
item.fulltext | no fulltext | - |
item.languageiso639-1 | en | - |
item.openairetype | conference paper | - |
item.grantfulltext | none | - |
item.cerifentitytype | Publications | - |
item.openairecristype | http://purl.org/coar/resource_type/c_5794 | - |
Appears in Collections: | 資訊科學研究所 |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.