Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Human Rights in the Prevention and Punishment of Terrorism by
bigCover of the book Enterprise Management with SAP SEMâ„¢ / Business Analytics by
bigCover of the book Root Hairs by
bigCover of the book Earthquake-Induced Landslides by
bigCover of the book Experimental Rock Deformation - The Brittle Field by
bigCover of the book New Developments in the Visualization and Processing of Tensor Fields by
bigCover of the book Financial Cryptography and Data Security by
bigCover of the book Cloud-Service-Zertifizierung by
bigCover of the book Psychologie der Menschenführung by
bigCover of the book Terrigenous Clastic Depositional Systems by
bigCover of the book Change Management Praxisfälle by
bigCover of the book Urology at a Glance by
bigCover of the book Mathematische Algorithmen und Computer-Performance kompakt by
bigCover of the book Carbohydrate Expression in the Intestinal Mucosa by
bigCover of the book The Development of the Chondrocranium of Gallus gallus by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy