Login / Signup
Blazing Fast 2PC in the Offline/Online Setting with Security for Malicious Adversaries.
Yehuda Lindell
Ben Riva
Published in:
CCS (2015)
Keyphrases
</>
real time
online learning
semi honest
access control
security requirements
malicious activities
malicious attacks
malicious users
intrusion detection
information security
key management
security threats
identity theft
detect malicious
malicious code
functional requirements
social media
website