Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Freelance IT by
bigCover of the book Inborn Metabolic Diseases by
bigCover of the book So werden wir lernen! by
bigCover of the book The Embryology of the Common Marmoset by
bigCover of the book Neurosurgical Ethics in Practice: Value-based Medicine by
bigCover of the book Verkettungsarten im Wertstrom schlanker Unternehmen by
bigCover of the book Manufacturing Processes 1 by
bigCover of the book Structural Vibration by
bigCover of the book The FORA Framework by
bigCover of the book Reflectance Confocal Microscopy for Skin Diseases by
bigCover of the book Wie systemische Kinder- und Jugendlichenpsychotherapie wirkt by
bigCover of the book Stress und Burnout in Organisationen by
bigCover of the book Sensory and Metabolic Control of Energy Balance by
bigCover of the book Histophysiology of the Obesity-Diabetes Syndrome in Sand Rats by
bigCover of the book Potassic Igneous Rocks and Associated Gold-Copper Mineralization by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy