[1]
Shefer Roper and Plessner Bar, “Secure Computing Protocols without Revealing the Inputs to Each of the Various Participants”, Int J Comm comp Tech, vol. 12, no. 2, pp. 31–39, Sep. 2024.