Login / Signup
Secure Multiparty Computation in the Presence of Covert Adaptive Adversaries.
Isheeta Nargis
Anwar Hasan
Published in:
IACR Cryptol. ePrint Arch. (2024)
Keyphrases
</>
secure multiparty computation
privacy preserving
information flow
data mining
information systems
database design