Toward a Game Theoretic View of Secure Computation
Crossref DOI link: https://doi.org/10.1007/s00145-015-9212-6
Published Online: 2015-08-14
Published Print: 2016-10
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Asharov, Gilad
Canetti, Ran
Hazay, Carmit
Text and Data Mining valid from 2015-08-14
Article History
Received: 10 February 2012
First Online: 14 August 2015
Free to read: This content has been made available to all.