Sign in

Practical Covertly Secure MPC for Dishonest Majority - Or: Breaking the SPDZ Limits.

Ivan DamgårdMarcel KellerEnrique LarraiaValerio PastroPeter SchollNigel P. Smart
Published in: ESORICS (2013)
Keyphrases
  • practical application
  • closed loop
  • real time
  • databases
  • genetic algorithm
  • dynamic model
  • security requirements
  • practical problems