Back to Results
First PageMeta Content
Security / Cryptography / Computing / Formal sciences / Theoretical computer science / Secure multi-party computation / Cryptographic protocol / Mobile agent / Algorithm / Transmission Control Protocol / Computer security


Abstract Privacy, Integrity, and Incentive-Compatibility in Computations with Untrusted Parties Sheng Zhong 2004
Add to Reading List

Document Date: 2004-07-28 23:00:33


Open Document

File Size: 614,98 KB

Share Result on Facebook
UPDATE