@dblp

Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion).

. Security Protocols Workshop, volume 9379 of Lecture Notes in Computer Science, page 361-363. Springer, (2015)

Links and resources

Tags