Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Earth on the Edge: Science for a Sustainable Planet by
bigCover of the book Nucleation Theory and Growth of Nanostructures by
bigCover of the book Uncertainty and Forecasting of Water Quality by
bigCover of the book Optimal Experimental Design for Non-Linear Models by
bigCover of the book Heart Rate and Rhythm by
bigCover of the book Dieter Senghaas by
bigCover of the book GPR Remote Sensing in Archaeology by
bigCover of the book Isotope-Based Quantum Information by
bigCover of the book Der unbegreifliche Zufall by
bigCover of the book Clifford Algebras and Lie Theory by
bigCover of the book International Trade Policies and Climate Change Governance by
bigCover of the book Reviews of Physiology, Biochemistry and Pharmacology 161 by
bigCover of the book Modern Techniques for Nano- and Microreactors/-reactions by
bigCover of the book Enteroceptors by
bigCover of the book Voting Paradoxes and Group Coherence by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy