Abstract
Applications of secure multiparty computation such as certain electronic voting or auction protocols require Byzantine agreement on large sets of elem......
小提示:本篇文献需要登录阅读全文,点击跳转登录