Login / Signup
Secure Computation on Additive Shares.
Zhihua Xia
Qi Gu
Wenhao Zhou
Lizhi Xiong
Jian Weng
Published in:
CoRR (2020)
Keyphrases
</>
efficient computation
security requirements
database
neural network
real world
information retrieval
website
low cost
security protocols