Research Article

Fair Secure Computation with Reputation Assumptions in the Mobile Social Networks

Figure 1

Reputation for each party when and .