Login / Signup
Secure computation with information leaking to an adversary.
Miklós Ajtai
Published in:
STOC (2011)
Keyphrases
</>
mobile devices
information sharing
machine learning
information processing
information systems
information sources
information content
real time
keywords
domain knowledge
end users
higher level
spatial information
structural information
raw data
sensitive information