Login / Signup
Secure two-party computation: a visual way.
Paolo D'Arco
Roberto De Prisco
Published in:
IACR Cryptol. ePrint Arch. (2013)
Keyphrases
</>
security issues
visual perception
visual information
efficient computation
security mechanisms
key agreement protocol
low level
record linkage
information systems
access control
visual features
visual data
security requirements
standard model
authentication scheme