Login / Signup

Secure Computation Based on Leaky Correlations: High Resilience Setting.

Alexander R. BlockHemanta K. MajiHai H. Nguyen
Published in: CRYPTO (2) (2017)
Keyphrases
  • high correlation
  • wide range
  • strongly correlated
  • case study
  • data sets
  • real world
  • search engine
  • privacy preserving
  • missing data
  • efficient computation
  • security analysis