How to securely compute the modulo-two sum of binary sources | IEEE Conference Publication | IEEE Xplore