Secure linear system computation in the presence of malicious adversaries
Crossref DOI link: https://doi.org/10.1007/s11432-014-5160-2
Published Online: 2014-08-17
Published Print: 2014-09
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Zhang, Bo
Zhang, FangGuo
Text and Data Mining valid from 2014-08-17