Login / Signup
A Real World Application of Secure Multi-party Computations (Transcript of Discussion).
Matthew Johnson
Published in:
Security Protocols Workshop (2008)
Keyphrases
</>
secure multi party
multi party
data mining
face recognition
constraint satisfaction problems