Date: 2014-06-24 16:43:48Cryptography Secure multi-party computation Secret sharing Public-key cryptography Universal composability Communications protocol Cryptographic protocol Cartesian coordinate system Transmission Control Protocol Secure two-party computation | | Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1Add to Reading ListSource URL: cs-www.cs.yale.eduDownload Document from Source Website File Size: 668,10 KBShare Document on Facebook
|