Rational adversary with flexible utility in secure two-party computation
Crossref DOI link: https://doi.org/10.1007/s12652-017-0669-z
Published Online: 2018-01-12
Published Print: 2019-08
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Wang, Yilei
Zhang, Shuaifeng
Tang, Yi
Su, Qingtang
Chen, Beijing
Text and Data Mining valid from 2018-01-12
Article History
Received: 17 October 2017
Accepted: 23 December 2017
First Online: 12 January 2018