Login / Signup
Peer-to-peer secure multi-party numerical computation facing malicious adversaries.
Danny Bickson
Tzachy Reinman
Danny Dolev
Benny Pinkas
Published in:
Peer-to-Peer Netw. Appl. (2010)
Keyphrases
</>
peer to peer
semi honest
secure multi party
privacy preserving
peer to peer networks
overlay network
real world
data mining
digital libraries
distributed computing
multi party
feature extraction
privacy preserving data mining
file sharing