Efficient Private Multi-Party Computations of Trust in the Presence of Curious and Malicious Users
Journal of Trust Management
doi 10.1186/2196-064x-1-8
Full Text
Open PDFAbstract
Available in full text
Date
January 1, 2014
Authors
Publisher
Springer Science and Business Media LLC