Return to Article Details A critical review on application of secure multi party computation protocols in cloud environment Download Download PDF