Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Alternatives to Imprisonment in England and Wales, Germany and Turkey by
bigCover of the book Jugendliche im Stress by
bigCover of the book Globalization by
bigCover of the book Flow and Combustion in Reciprocating Engines by
bigCover of the book Single Piles in Liquefiable Ground by
bigCover of the book Combating Fungal Infections by
bigCover of the book Handbuch Industrie 4.0 Bd.1 by
bigCover of the book Microeconomics by
bigCover of the book Komplikationsmanagement in der Chirurgie by
bigCover of the book Klüger als wir denken: Wozu Tiere fähig sind by
bigCover of the book Ancient Egyptian Beads by
bigCover of the book Beauty in Chemistry by
bigCover of the book Protocols for Multislice CT by
bigCover of the book Experimental Rock Deformation - The Brittle Field by
bigCover of the book A Measure Theoretical Approach to Quantum Stochastic Processes by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy