In this note, we report on the first large-scale and practical application of secure multiparty computation, which took place in January 2008. We also report on the novel cryptographic protocols that were used. © 2009 Springer Berlin Heidelberg.
CITATION STYLE
Bogetoft, P., Christensen, D. L., Damgård, I., Geisler, M., Jakobsen, T., Krøigaard, M., … Toft, T. (2009). Secure multiparty computation goes live. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5628 LNCS, pp. 325–343). https://doi.org/10.1007/978-3-642-03549-4_20
Mendeley helps you to discover research relevant for your work.