Sign in

A Real World Application of Secure Multi-party Computations (Transcript of Discussion).

Matthew Johnson
Published in: Security Protocols Workshop (2008)
Keyphrases
  • secure multi party
  • multi party
  • data mining
  • face recognition
  • constraint satisfaction problems