Login / Signup
A New Approach to Practical Active-Secure Two-Party Computation
Jesper Buus Nielsen
Peter Sebastian Nordholt
Claudio Orlandi
Sai Sheshank Burra
Published in:
CoRR (2012)
Keyphrases
</>
key agreement protocol
real world
efficient computation
method invocation
machine learning
lightweight
quality of service
security requirements
identity management