USENIX Security '14 - Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens

1.4K views

USENIX

8 years ago

USENIX Security '14 - Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens

USENIX Security '14 - Ad-Hoc Secure Two-Party Computation on Mobile Devices using Hardware Tokens