Skip to main content
. 2018 Apr 10;12:19. doi: 10.1186/s40246-018-0147-5

Fig. 3.

Fig. 3

Framework for the secure multiparty computation