C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
On the Power of Secure Two-Party Computation.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Published in:
CRYPTO (2) (2016)
Keyphrases
</>
power consumption
computational power
database
real time
database systems
security requirements
key management