Sign in

Secure Computation from Millionaire.

Abhi ShelatMuthuramakrishnan Venkitasubramaniam
Published in: ASIACRYPT (1) (2015)
Keyphrases
  • case study
  • efficient computation
  • databases
  • data mining
  • lightweight
  • security requirements
  • key management
  • parallel computation
  • identity management