Login / Signup

Consideration of the XOR-operation Based Secure Multiparty Computation.

Yuji Suga
Published in: IMIS (2015)
Keyphrases
  • secure multiparty computation
  • privacy preserving
  • real world