A different look at secure distributed computation | IEEE Conference Publication | IEEE Xplore