Login / Signup
New Approach to Dishonest-Majority Secure Multiparty Computation for Malicious Adversaries when n < 2k - 1.
Shogo Ochiai
Keiichi Iwamura
Published in:
CANDAR (Workshops) (2020)
Keyphrases
</>
secure multiparty computation
privacy preserving
data miner
semi honest
privacy preserving data mining
privacy preservation
data perturbation
data mining techniques
sensitive information
database
data mining
information systems
third party
privacy issues
private data