Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Gauss by
bigCover of the book Biosurfactants by
bigCover of the book Der verborgene Hunger by
bigCover of the book The Global Environment by
bigCover of the book Behavioral Neurobiology of Alcohol Addiction by
bigCover of the book CT Imaging of Myocardial Perfusion and Viability by
bigCover of the book Electromyography and Evoked Potentials by
bigCover of the book Color Atlas of Pediatric Anatomy, Laparoscopy, and Thoracoscopy by
bigCover of the book Pediatric Uroradiology by
bigCover of the book Projektabwicklung in der Bauwirtschaft-prozessorientiert by
bigCover of the book Atlas of Enteroscopy by
bigCover of the book Integrated Business Information Systems by
bigCover of the book Delta-Sigma A/D-Converters by
bigCover of the book In-situ Characterization Techniques for Nanomaterials by
bigCover of the book Sicherheitsgerichtete Echtzeitsysteme by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy