Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book On a Sustainable Future of the Earth's Natural Resources by
bigCover of the book Beyond Right and Wrong by
bigCover of the book Ionic Liquids (ILs) in Organometallic Catalysis by
bigCover of the book JIMD Reports, Volume 38 by
bigCover of the book Scientific Marketing in der Medizin by
bigCover of the book Analytical Imaging Techniques for Soft Matter Characterization by
bigCover of the book Einzel- oder Generalplaner - die optimale Planereinsatzform by
bigCover of the book Normal and Abnormal Development of the Cortex by
bigCover of the book Sports Injuries by
bigCover of the book Prävention von Erschöpfung in der Arbeitswelt by
bigCover of the book Origin and Mineralogy of Clays by
bigCover of the book The Economics of Tourism Destinations by
bigCover of the book International Textbook of Aesthetic Surgery by
bigCover of the book Prokhorov and Contemporary Probability Theory by
bigCover of the book Schutz genetischer, medizinischer und sozialer Daten als multidisziplinäre Aufgabe by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy