Sign in

A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates).

Matthew JohnsonRalph Owen
Published in: Security Protocols Workshop (2008)
Keyphrases
  • secure multi party
  • multi party
  • data cleaning