Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Advanced Fluorescence Reporters in Chemistry and Biology II by
bigCover of the book Fertigungsverfahren 1 by
bigCover of the book Indigenous Culture, Education and Globalization by
bigCover of the book The Yangtze River Delta by
bigCover of the book Mononuclear Phagocytes in the Central Nervous System by
bigCover of the book Schadensersatz wegen vorvertraglicher Informationspflichtverletzung beim Verbraucherkredit by
bigCover of the book Multimedia Cartography by
bigCover of the book Tumours of the Hand by
bigCover of the book The Role of the Regions in EU Governance by
bigCover of the book Advances in CT IV by
bigCover of the book Springer Handbook of Nanotechnology by
bigCover of the book Continental-Crust Structures on the Continental Margin of Western North America by
bigCover of the book Reactions and Processes by
bigCover of the book Piezotronics and Piezo-Phototronics by
bigCover of the book Automotive Development Processes by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy