|
Volumn , Issue , 2005, Pages 513-522
|
Covert two-party computation
|
Author keywords
Covert Computation; Fair two party computation; Steganography; Two Party Computation
|
Indexed keywords
COVERT COMPUTATION;
FAIR TWO-PARTY COMPUTATION;
STEGANOGRAPHY;
TWO-PARTY COMPUTATION;
FUNCTION EVALUATION;
INFORMATION ANALYSIS;
MATHEMATICAL MODELS;
SECURITY SYSTEMS;
COMPUTATION THEORY;
|
EID: 34848898460
PISSN: 07378017
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/1060590.1060668 Document Type: Conference Paper |
Times cited : (31)
|
References (23)
|