Efficiently Making Secure Two-Party Computation Fair. Kilinç, H. & Küpçü, A. IACR Cryptol. ePrint Arch., 2014.
Paper bibtex @article{DBLP:journals/iacr/KilincK14,
author = {Handan Kilin{\c{c}} and
Alptekin K{\"{u}}p{\c{c}}{\"{u}}},
title = {Efficiently Making Secure Two-Party Computation Fair},
journal = {{IACR} Cryptol. ePrint Arch.},
pages = {896},
year = {2014},
url = {http://eprint.iacr.org/2014/896},
timestamp = {Mon, 11 May 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/iacr/KilincK14.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"igPkALKQCbyG8M2fh","bibbaseid":"kilin-kp-efficientlymakingsecuretwopartycomputationfair-2014","author_short":["Kilinç, H.","Küpçü, A."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Handan"],"propositions":[],"lastnames":["Kilinç"],"suffixes":[]},{"firstnames":["Alptekin"],"propositions":[],"lastnames":["Küpçü"],"suffixes":[]}],"title":"Efficiently Making Secure Two-Party Computation Fair","journal":"IACR Cryptol. ePrint Arch.","pages":"896","year":"2014","url":"http://eprint.iacr.org/2014/896","timestamp":"Mon, 11 May 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/iacr/KilincK14.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/iacr/KilincK14,\n author = {Handan Kilin{\\c{c}} and\n Alptekin K{\\\"{u}}p{\\c{c}}{\\\"{u}}},\n title = {Efficiently Making Secure Two-Party Computation Fair},\n journal = {{IACR} Cryptol. ePrint Arch.},\n pages = {896},\n year = {2014},\n url = {http://eprint.iacr.org/2014/896},\n timestamp = {Mon, 11 May 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/iacr/KilincK14.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Kilinç, H.","Küpçü, A."],"key":"DBLP:journals/iacr/KilincK14","id":"DBLP:journals/iacr/KilincK14","bibbaseid":"kilin-kp-efficientlymakingsecuretwopartycomputationfair-2014","role":"author","urls":{"Paper":"http://eprint.iacr.org/2014/896"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://dblp.org/pid/33/4077.bib","dataSources":["aG64ACiuFAz54RLy5"],"keywords":[],"search_terms":["efficiently","making","secure","two","party","computation","fair","kilinç","küpçü"],"title":"Efficiently Making Secure Two-Party Computation Fair","year":2014}