Sign in

Cryptographically Secure Computation.

Emily ShenMayank VariaRobert K. CunninghamW. Konrad Vesey
Published in: Computer (2015)
Keyphrases
  • security requirements
  • security analysis
  • search engine
  • data sets
  • image sequences
  • lightweight