Login / Signup
Secure Computation of the kth-Ranked Element in a Star Network.
Anselme Tueno
Florian Kerschbaum
Stefan Katzenbeisser
Yordan Boev
Mubashir Qureshi
Published in:
CoRR (2019)
Keyphrases
</>
action recognition
peer to peer
network structure
computer networks
network model
wireless sensor networks
communication networks
network resources
network traffic
network management
network design
security analysis
application level
network topologies