Login / Signup
Proving Correctness and Security of Two-Party Computation Implemented in Java in Presence of a Semi-Honest Sender.
Florian Böhl
Simon Greiner
Patrik Scheidecker
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
semi honest
privacy preserving
secure multi party computation
privacy preserving data mining
multi party
dot product
secure multi party
java language
set intersection
key agreement protocol
intrusion detection
source code
email
private information
information security
kernel methods
vertically partitioned data