1 results match your criteria: "Ieee Transactions On Information Forensics And Security[Journal]"

Conducting secure computations to protect against malicious adversaries is an emerging field of research. Current models designed for malicious security typically necessitate the involvement of two or more servers in an honest-majority setting. Among privacy-preserving data mining techniques, significant attention has been focused on the classification problem.

View Article and Find Full Text PDF