Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Generic Systems Engineering by
bigCover of the book Strategy in Bedside Hemodynamic Monitoring by
bigCover of the book Climate Change Governance by
bigCover of the book Transport and Chemical Transformation of Pollutants in the Troposphere by
bigCover of the book Surgery of the Abdominal Wall by
bigCover of the book Novel Sampling Approaches in Higher Dimensional NMR by
bigCover of the book Relationships Between Perception and Action by
bigCover of the book New Corporate Governance by
bigCover of the book Neural Networks: Tricks of the Trade by
bigCover of the book Energieeffizienz by
bigCover of the book Chinesische Medizin für die westliche Welt by
bigCover of the book Rock and Pop Venues by
bigCover of the book The Vegetation of Georgia (South Caucasus) by
bigCover of the book Diabetes-Handbuch by
bigCover of the book Change Communications Jahrbuch 2010 by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy