Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation

Nonfiction, Computers, Advanced Computing, Theory, Computer Hardware, Input-Output Equipment, General Computing
Big bigCover of Engineering Secure Two-Party Computation Protocols

More books from Springer Berlin Heidelberg

bigCover of the book Logistik 2 by
bigCover of the book Agile Software Development by
bigCover of the book Laser Drilling by
bigCover of the book Cervical Cancer by
bigCover of the book Color Atlas of Nails by
bigCover of the book Plasma Turbulence in the Solar System by
bigCover of the book Elektromobilität by
bigCover of the book Singular Spectrum Analysis for Time Series by
bigCover of the book Sicherheitsbewertung von Composite-Druckgasbehältern by
bigCover of the book The Message of Quantum Science by
bigCover of the book Advances in Metallic Biomaterials by
bigCover of the book OTA-Lehrbuch by
bigCover of the book Prediction of Interannual Climate Variations by
bigCover of the book Lebensphasenorientierte Personalpolitik by
bigCover of the book Digital Marketplaces Unleashed by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy