@dblp

Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.

, , and . ACISP, volume 2384 of Lecture Notes in Computer Science, page 497-512. Springer, (2002)

Links and resources

Tags