International Journal of communication and computer Technologies
Return to Article Details Secure Computing Protocols without Revealing the Inputs to Each of the Various Participants Download Download PDF