Report - pure.au.dkpure.au.dk/portal/files/54492707/PH.D_dissertation_Peter... · 2013-06-11 · Abstract We present two new approaches to maliciously secure two-party computation withpracticalefficiency:

Please pass captcha verification before submit form