메뉴 건너뛰기




Volumn 1465, Issue , 1998, Pages 214-226

Publicly verifiable lotteries: Applications of delaying functions

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 84958038323     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0055485     Document Type: Conference Paper
Times cited : (52)

References (20)
  • 2
    • 0029719668 scopus 로고    scopus 로고
    • Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing
    • M. Bellare, J. Garay, and T. Rabin. Distributed Pseudo-Random Bit Generators - A New Way to Speed-Up Shared Coin Tossing, PODC’96, ACM, 1996.
    • (1996) PODC’96, ACM
    • Bellare, M.1    Garay, J.2    Rabin, T.3
  • 7
    • 0022145479 scopus 로고
    • Security without Identification: Transaction Systems to Make Big Brother Obsolete
    • October
    • D. Chaum, “Security without Identification: Transaction Systems to Make Big Brother Obsolete”, CACM (28,10), October 1985, pp. 1030-1044.
    • (1985) CACM , pp. 1030-1044
    • Chaum, D.1
  • 8
    • 0001126172 scopus 로고    scopus 로고
    • Weizmann Technical Report CS95-20, 1995 (Also preliminary version in CRYPTO ’92
    • C. Dwork, and M. Naor. Pricing via processing or combating junk mail. Weizmann Technical Report CS95-20, 1995 (Also preliminary version in CRYPTO ’92, pp. 139-147).
    • Pricing via Processing Or Combating Junk Mail , pp. 139-147
    • Dwork, C.1    Naor, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.