Bureaucratic protocols for secure two-party sorting, selection, and permuting

Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu. Bureaucratic protocols for secure two-party sorting, selection, and permuting. In Dengguo Feng, David A. Basin, Peng Liu, editors, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010. pages 226-237, ACM, 2010. [doi]

Authors

Guan Wang

This author has not been identified. Look up 'Guan Wang' in Google

Tongbo Luo

This author has not been identified. Look up 'Tongbo Luo' in Google

Michael T. Goodrich

This author has not been identified. Look up 'Michael T. Goodrich' in Google

Wenliang Du

This author has not been identified. Look up 'Wenliang Du' in Google

Zutao Zhu

This author has not been identified. Look up 'Zutao Zhu' in Google