SHEFER ROPER; PLESSNER BAR. Secure Computing Protocols without Revealing the Inputs to Each of the Various Participants. International Journal of communication and computer Technologies, [S. l.], v. 12, n. 2, p. 31–39, 2024. Disponível em: https://ijccts.org/index.php/pub/article/view/234. Acesso em: 16 oct. 2024.