Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Eating Disorders, Addictions and Substance Use Disorders by
bigCover of the book Databases for Health Care by
bigCover of the book Foundations of Micropolar Mechanics by
bigCover of the book Tractable Models of Solid Mechanics by
bigCover of the book Generic Systems Engineering by
bigCover of the book Epoxidations and Hydroperoxidations of α,β-Unsaturated Ketones by
bigCover of the book Technology Transfer and Economic Growth in Sub-Sahara African Countries by
bigCover of the book Business Technology Organization by
bigCover of the book Forensic Medicine by
bigCover of the book Philosophie der Quantenphysik by
bigCover of the book The Technological Singularity by
bigCover of the book Altern, Müdigkeit und Entzündungen verstehen by
bigCover of the book Die Primäre Produktion by
bigCover of the book Das Chaos im Karpfenteich oder Wie Mathematik unsere Welt regiert by
bigCover of the book Pancreatic Cancer by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy