Login / Signup
OT-Combiners via Secure Computation.
Danny Harnik
Yuval Ishai
Eyal Kushilevitz
Jesper Buus Nielsen
Published in:
TCC (2008)
Keyphrases
</>
security requirements
neural network
machine learning
information retrieval
artificial intelligence
access control
electronic commerce
covert channel