Login / Signup
Non-Interactive Secure Computation Based on Cut-and-Choose.
Arash Afshar
Payman Mohassel
Benny Pinkas
Ben Riva
Published in:
EUROCRYPT (2014)
Keyphrases
</>
virtual reality
data sets
data mining
social networks
video sequences
user interaction
security issues
security requirements
covert channel