Login / Signup
Secure Computation Based on Leaky Correlations: High Resilience Setting.
Alexander R. Block
Hemanta K. Maji
Hai H. Nguyen
Published in:
CRYPTO (2) (2017)
Keyphrases
</>
high correlation
wide range
strongly correlated
case study
data sets
real world
search engine
privacy preserving
missing data
efficient computation
security analysis