Login / Signup
Secure Outsourced Computation.
Jake Loftus
Nigel P. Smart
Published in:
AFRICACRYPT (2011)
Keyphrases
</>
efficient computation
third party
lightweight
security requirements
key management
security protocols
group communication
covert channel