Login / Signup

Almost-Everywhere Secure Computation with Edge Corruptions.

Nishanth ChandranJuan A. GarayRafail Ostrovsky
Published in: J. Cryptol. (2015)
Keyphrases
  • edge detection
  • edge information
  • security issues
  • feature extraction
  • input image
  • weighted graph
  • standard model