Entrusting Private Computation and Data to Untrusted Networks | IEEE Journals & Magazine | IEEE Xplore