Description: This paper investigates ways to give a method, that is a valid agreement for both parties to use an untrusted third party can be used to build a high-efficiency multi-protocol peer-to-peer security.
To Search:
File list (Check if you may need any files):
安全多方计算.doc