Secure computation for data privacy | IEEE Conference Publication | IEEE Xplore