Login / Signup
Turning Lemons into Peaches using Secure Computation.
Stav Buchsbaum
Ran Gilad-Bachrach
Yehuda Lindell
Published in:
CoRR (2018)
Keyphrases
</>
data sets
security issues
security management
neural network
data mining
knowledge base
evolutionary algorithm
authentication scheme
covert channel