Secure computation using leaky tokens

From MaRDI portal
Publication:5167802