Cited By
View all- Gamiz IRegueiro CLage OJacob EAstorga J(2024)Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computationsInternational Journal of Information Security10.1007/s10207-024-00939-424:1Online publication date: 21-Nov-2024
- Bater JElliott GEggen CGoel SKho ARogers J(2017)SMCQLProceedings of the VLDB Endowment10.14778/3055330.305533410:6(673-684)Online publication date: 1-Feb-2017
- Pettai MLaud P(2015)Automatic Proofs of Privacy of Secure Multi-party Computation Protocols against Active AdversariesProceedings of the 2015 IEEE 28th Computer Security Foundations Symposium10.1109/CSF.2015.13(75-89)Online publication date: 13-Jul-2015
- Show More Cited By