Yao A C. Protocols for secure computations//Proceedings of 23rd Annual IEEE Symposium on Foundations of Computer Science. Los Alamitos: IEEE Computer Society Press, 1982: 160-164.
[2]
Goldreich O, Micali S, Wigderson A. How to play any mental game//Proceedings of the 19th Annual ACM Conference on Theory of Computing. New York: ACM Press, 1987: 218-229.
[3]
Du W L, Atallah M J. Privacy-preserving cooperative scientific computations//Proceedings of the 14th IEEE Computer Security Workshop. USA: IEEE Computer Society,2001: 273-282.
[4]
罗永龙, 黄刘生, 荆巍巍, 等. 空间几何对象相对位置判定中的私有信息保护[J]. 计算机研究与发展, 2006, 43(3): 410-416. Luo Yonglong, Huang Liusheng, Jing Weiwei, et al. Privacy protection in the relative position determination for two spatial geometric objects[J]. Journal of Computer Research and Development, 2006, 43(3): 410-416.
[5]
罗永龙, 黄刘生, 荆巍巍, 等. 保护私有信息的叉积协议及其应用[J]. 计算机学报, 2007, 30(2): 248-254. Luo Yonglong, Huang Liusheng, Jing Weiwei, et al. Privacy-preserving cross product protocol and its applications[J]. Chinese Journal of Computers, 2007, 30(2): 248-254.
[6]
Li Shundong, Dai Yiqi. Some secure two party computational geometry. Journal of Computer Science and Technology, 2005, 20(2): 258-263.