Sign in
Information-theoretically secure three-party computation with One corrupted party.
Ye Wang
Prakash Ishwar
Shantanu Rane
Published in:
ISIT (2013)
Keyphrases
</>
neural network
domain knowledge
end users
information processing
multi party
case study
video sequences
prior knowledge
semantic information
spatial information
structural information
information resources