Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Novel Optical Nanoprobes for Chemical and Biological Analysis by
bigCover of the book Varicella-zoster Virus by
bigCover of the book Computational Fluid Dynamics 2010 by
bigCover of the book Shape-Memory Polymers by
bigCover of the book The NMR Probe of High-Tc Materials and Correlated Electron Systems by
bigCover of the book Das Buch der Klänge by
bigCover of the book Transgenic Crop Plants by
bigCover of the book IT-Betrieb by
bigCover of the book Posttraumatische Belastungsstörungen by
bigCover of the book Embryology of Dolphins by
bigCover of the book Introduction to Probability and Statistics for Engineers by
bigCover of the book Colorectal Cancer in the Elderly by
bigCover of the book CSR und Kultur by
bigCover of the book Cross-linguistic Influences in Multilingual Language Acquisition by
bigCover of the book Duplexsonographie der hirnversorgenden Arterien by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy