Introduction to Secure Outsourcing Computation

Nonfiction, Computers, Internet, Security, Networking & Communications, Computer Security, Operating Systems
Big bigCover of Introduction to Secure Outsourcing Computation

More books from Morgan & Claypool Publishers

bigCover of the book Qualitative HCI Research by
bigCover of the book Electrostatic Phenomena on Planetary Surfaces by
bigCover of the book Creating Autonomous Vehicle Systems by
bigCover of the book Web Corpus Construction by
bigCover of the book Capture and Relaxation in Self-Assembled Semiconductor Quantum Dots by
bigCover of the book Robot Learning from Human Teachers by
bigCover of the book Atoms and Photons and Quanta, Oh My! by
bigCover of the book Graph Mining by
bigCover of the book Smart Internal Stimulus-Responsive Nanocarriers for Drug and Gene Delivery by
bigCover of the book Embracing Interference in Wireless Systems by
bigCover of the book Web Indicators for Research Evaluation by
bigCover of the book Creating Materials with a Desired Refraction Coefficient by
bigCover of the book Modeling Self-Heating Effects in Nanoscale Devices by
bigCover of the book HCI Theory by
bigCover of the book Customizable Computing by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy