Date: 2014-06-25 08:00:47Cryptography Secure multi-party computation Secret sharing Public-key cryptography Universal composability Communications protocol Cryptographic protocol Cartesian coordinate system Transmission Control Protocol Secure two-party computation | | Systematizing Secure Computation for Research and Decision Support Jason Perry1 , Debayan Gupta2 , Joan Feigenbaum2 and Rebecca N. Wright1 1Add to Reading ListSource URL: work.debayangupta.comDownload Document from Source Website File Size: 668,10 KBShare Document on Facebook
|