Login / Signup
Secure Computation from Millionaire.
Abhi Shelat
Muthuramakrishnan Venkitasubramaniam
Published in:
ASIACRYPT (1) (2015)
Keyphrases
</>
case study
efficient computation
databases
data mining
lightweight
security requirements
key management
parallel computation
identity management