Sign in

Two-Output Secure Computation with Malicious Adversaries.

Abhi ShelatChih-Hao Shen
Published in: EUROCRYPT (2011)
Keyphrases
  • malicious attacks
  • semi honest
  • neural network
  • web services
  • input data
  • operating system
  • security requirements
  • bounded rationality