Bureaucratic protocols for secure two-party sorting, selection, and permuting

Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu. Bureaucratic protocols for secure two-party sorting, selection, and permuting. In Dengguo Feng, David A. Basin, Peng Liu, editors, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010. pages 226-237, ACM, 2010. [doi]

Bibliographies