Login / Signup
Realizing correlated equilibrium by secure computation.
Lirong Qiu
Xin Sun
Xishun Zhao
Published in:
J. Inf. Secur. Appl. (2017)
Keyphrases
</>
evolutionary algorithm
special case
efficient computation
security requirements
encryption scheme