Login / Signup
Perfectly Secure Multiparty Computation and the Computational Overhead of Cryptography.
Ivan Damgård
Yuval Ishai
Mikkel Krøigaard
Published in:
IACR Cryptol. ePrint Arch. (2010)
Keyphrases
</>
secure multiparty computation
privacy preserving
cellular automata
information security
privacy issues
data perturbation
privacy preserving data mining
private information
web search