Secure Computation to Hide Functions of Inputs | IEEE Conference Publication | IEEE Xplore