Login / Signup
Peer-to-Peer Secure Multi-Party Numerical Computation Facing Malicious Adversaries
Danny Bickson
Tzachy Reinman
Danny Dolev
Benny Pinkas
Published in:
CoRR (2009)
Keyphrases
</>
peer to peer
semi honest
secure multi party
privacy preserving
peer to peer networks
preprocessing
resource discovery
file sharing
software development
multi party
dot product