Bureaucratic protocols for secure two-party sorting, selection, and permuting

Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu. Bureaucratic protocols for secure two-party sorting, selection, and permuting. In Dengguo Feng, David A. Basin, Peng Liu, editors, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010. pages 226-237, ACM, 2010. [doi]

@inproceedings{WangLGDZ10,
  title = {Bureaucratic protocols for secure two-party sorting, selection, and permuting},
  author = {Guan Wang and Tongbo Luo and Michael T. Goodrich and Wenliang Du and Zutao Zhu},
  year = {2010},
  doi = {10.1145/1755688.1755716},
  url = {http://doi.acm.org/10.1145/1755688.1755716},
  tags = {protocol},
  researchr = {https://researchr.org/publication/WangLGDZ10},
  cites = {0},
  citedby = {0},
  pages = {226-237},
  booktitle = {Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010},
  editor = {Dengguo Feng and David A. Basin and Peng Liu},
  publisher = {ACM},
  isbn = {978-1-60558-936-7},
}