Login / Signup
On the Power of Secure Two-Party Computation.
Carmit Hazay
Muthuramakrishnan Venkitasubramaniam
Published in:
CRYPTO (2) (2016)
Keyphrases
</>
power consumption
computational power
database
real time
database systems
security requirements
key management