Login / Signup
Outsourcing secure two-party computation as a black box.
Henry Carter
Benjamin Mood
Patrick Traynor
Kevin R. B. Butler
Published in:
Secur. Commun. Networks (2016)
Keyphrases
</>
black box
white box
black boxes
information technology
information systems
hybrid systems
state transition
test cases
rule extraction
white box testing
integration testing
key agreement protocol
open source
databases
key management
security analysis
computational intelligence
feature space
training data