Login / Signup
Compilation for Secure Two-Party Computations.
Martin Franz
Andreas Holzer
Stefan Katzenbeisser
Christian Schallhart
Helmut Veith
Published in:
Software Engineering & Management (2015)
Keyphrases
</>
key agreement protocol
highly efficient
security model
security issues
security requirements
database
record linkage
security analysis
data sets
key distribution
user authentication
covert channel