• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Secure computation protocols under asymmetric scenarios in enterprise information system.

Yilei WangMinghao ZhaoYuemei HuYijie GaoXinchun Cui
Published in: Enterp. Inf. Syst. (2021)
Keyphrases