Efficient Private Multi-Party Computations of Trust in the Presence of Curious and Malicious Users

Journal of Trust Management
doi 10.1186/2196-064x-1-8
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Science and Business Media LLC