Login / Signup

Outsourcing secure two-party computation as a black box.

Henry CarterBenjamin MoodPatrick TraynorKevin R. B. Butler
Published in: Secur. Commun. Networks (2016)
Keyphrases