Login / Signup

Secure Outsourced Computation.

Jake LoftusNigel P. Smart
Published in: AFRICACRYPT (2011)
Keyphrases
  • efficient computation
  • third party
  • lightweight
  • security requirements
  • key management
  • security protocols
  • group communication
  • covert channel