Data and Applications Security XIX
From MaRDI portal
Publication:5897463
Recommendations
Cited in
(8)- Revealing Additional Information in Two-Party Computations
- scientific article; zbMATH DE number 4191075 (Why is no real title available?)
- On statistical security in two-party computation
- On the Power of Secure Two-Party Computation
- Covert two-party computation
- Channels of small log-ratio leakage and characterization of two-party differentially private computation
- Efficient secure primitive for privacy preserving distributed computations
- On the power of secure two-party computation
This page was built for publication: Data and Applications Security XIX
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5897463)