Computing
Client–server model
Peer-to-peer
Trusted Computing
Communications protocol
Secure two-party computation
Secure multi-party computation
Cryptographic protocols
Data
Information