Login / Signup

OT-Combiners via Secure Computation.

Danny HarnikYuval IshaiEyal KushilevitzJesper Buus Nielsen
Published in: TCC (2008)
Keyphrases
  • security requirements
  • neural network
  • machine learning
  • information retrieval
  • artificial intelligence
  • access control
  • electronic commerce
  • covert channel