Communication requirements for secure computation | IEEE Conference Publication | IEEE Xplore