Data and Applications Security XIX
From MaRDI portal
Publication:5897463
DOI10.1007/11535706zbMATH Open1158.94393OpenAlexW2485395822MaRDI QIDQ5897463FDOQ5897463
Authors: Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu
Publication date: 1 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11535706
Recommendations
Cited In (8)
- On statistical security in two-party computation
- Covert two-party computation
- Revealing Additional Information in Two-Party Computations
- On the Power of Secure Two-Party Computation
- Channels of small log-ratio leakage and characterization of two-party differentially private computation
- Title not available (Why is that?)
- Efficient secure primitive for privacy preserving distributed computations
- On the power of secure two-party computation
This page was built for publication: Data and Applications Security XIX
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5897463)