Login / Signup
(Unconditional) Secure Multiparty Computation with Man-in-the-middle Attacks
Shailesh Vaya
Published in:
CoRR (2010)
Keyphrases
</>
secure multiparty computation
privacy preserving
countermeasures
data sets
watermarking scheme
database
databases
information retrieval
image reconstruction
sensitive information