Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Challenges of a Changing Earth by
bigCover of the book Progress in Nano-Electro-Optics I by
bigCover of the book Die Physik der Sterne by
bigCover of the book Remote Sensing of the Changing Oceans by
bigCover of the book Dos and Don’ts in Human Resources Management by
bigCover of the book Nasal Polyposis by
bigCover of the book Sprechen Sie für sich by
bigCover of the book Handbook of Conceptual Modeling by
bigCover of the book Software Engineering and Formal Methods by
bigCover of the book High Resolution Microbial Single Cell Analytics by
bigCover of the book Visite! - Kommunikation auf Augenhöhe im interdisziplinären Team by
bigCover of the book Innovation and International Corporate Growth by
bigCover of the book The Basel II Risk Parameters by
bigCover of the book Mikroökonomik by
bigCover of the book Forensik in der digitalen Welt by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy