Peer-to-peer secure multi-party numerical computation facing malicious adversariesDanny BicksonTzachy Reinmanet al.2009Peer-to-Peer Networking and Applications