Login / Signup
Study on the Technology of the Secure Computation in the Different Adversarial Models.
Xiaolan Zhang
Hongxiang Sun
Qiaoyan Wen
Shi Sha
Published in:
CSISE (1) (2011)
Keyphrases
</>
case study
statistical analysis
multiple regression
data encryption
neural network
prior knowledge
data processing
theoretical framework
complex systems
experimental data
cost effective
statistical models
digital rights management