Login / Signup
Outsourcing Secure Two-Party Computation as a Black Box.
Henry Carter
Benjamin Mood
Patrick Traynor
Kevin R. B. Butler
Published in:
CANS (2015)
Keyphrases
</>
black box
black boxes
white box
integration testing
key agreement protocol
information technology
test cases
white box testing
relational databases
access control
business process
rule extraction
hybrid systems
data management
state transition