Login / Signup
A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates).
Matthew Johnson
Ralph Owen
Published in:
Security Protocols Workshop (2008)
Keyphrases
</>
secure multi party
multi party
data cleaning