Amanote Research
Register
Sign In
Secure Computation
doi 10.1007/3-540-46766-1_32
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
Silvio Micali
Phillip Rogaway
Publisher
Springer Berlin Heidelberg
Related search
Secure Computation Without Authentication
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Efficient Non-Interactive Secure Computation
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Secure Computation Against Adaptive Auxiliary Information
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Composing Differential Privacy and Secure Computation
Secure Internet Accessible Mathematical Computation Framework
Secure Two-Party Computation Over Unreliable Channels
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Efficiently Making Secure Two-Party Computation Fair
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Faster Secure Two-Party Computation With Less Memory
Span Programs and General Secure Multi-Party Computation
BRICS Report Series