Login / Signup
Two-Output Secure Computation with Malicious Adversaries.
Abhi Shelat
Chih-Hao Shen
Published in:
EUROCRYPT (2011)
Keyphrases
</>
malicious attacks
semi honest
neural network
web services
input data
operating system
security requirements
bounded rationality