Login / Signup
Secure Multi-Party Computation with Security Modules.
Zinaida Benenson
Felix C. Gärtner
Dogan Kesdogan
Published in:
Sicherheit (2005)
Keyphrases
</>
secure multi party computation
scalar product
privacy preserving
semi honest
information security
access control
security requirements
intrusion detection
privacy preserving data mining
data privacy
security policies
peer to peer
encryption scheme
security analysis
homomorphic encryption