Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Software Quality by
bigCover of the book Capacity Building for the Planning, Assessment and Systematic Observations of Forests by
bigCover of the book Marketing für Physiotherapeuten by
bigCover of the book Transactions on Large-Scale Data- and Knowledge-Centered Systems XIII by
bigCover of the book Botulinum Toxin in Urology by
bigCover of the book Proceedings of 2013 Chinese Intelligent Automation Conference by
bigCover of the book Classical Field Theory by
bigCover of the book Moderne C++ Programmierung by
bigCover of the book Judicial Application of International Law in Southeast Europe by
bigCover of the book Philosophie der Führung by
bigCover of the book Service Parts Planning with SAP SCMâ„¢ by
bigCover of the book Wild Crop Relatives: Genomic and Breeding Resources by
bigCover of the book Cryptorchidism by
bigCover of the book Transport Development in Asian Megacities by
bigCover of the book Informationspsychologie by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy