Published in

Springer, Lecture Notes in Computer Science, p. 89-106, 2009

DOI: 10.1007/978-3-642-01957-9_6

Links

Tools

Export citation

Search in Google Scholar

Practical secure evaluation of semi-private functions

This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Red circle
Preprint: archiving forbidden
Orange circle
Postprint: archiving restricted
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO