Kuoky
Home
Categories
Authors
All Editorials
Engineering Secure Two-Party Computation Protocols
Design, Optimization, and Applications of Efficient Secure Function Evaluation
Nonfiction
,
Computers
,
Advanced Computing
,
Theory
,
Computer Hardware
,
Input-Output Equipment
,
General Computing
View on Amazon
View on AbeBooks
View on Kobo
View on B.Depository
View on eBay
View on Walmart
More books from Springer Berlin Heidelberg
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our
Privacy Policy