Articles of Multi-party Security Computing