Login / Signup

Realizing correlated equilibrium by secure computation.

Lirong QiuXin SunXishun Zhao
Published in: J. Inf. Secur. Appl. (2017)
Keyphrases
  • evolutionary algorithm
  • special case
  • efficient computation
  • security requirements
  • encryption scheme