Secure linear system computation in the presence of malicious adversaries

From MaRDI portal
Publication:2335946