Login / Signup
Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing.
Diana-Elena Falamas
Kinga Marton
Alin Suciu
Published in:
Symmetry (2021)
Keyphrases
</>
privacy preserving
secure multiparty computation
multi party
secret sharing
privacy preserving data mining
privacy preservation
private information
data perturbation
vertically partitioned data
databases
privacy issues
privacy guarantees
database
data mining techniques
sensitive information