Cargando…

Efficient Secure Two-Party Protocols Techniques and Constructions /

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation - both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing effic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Hazay, Carmit (Autor), Lindell, Yehuda (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2010.
Edición:1st ed. 2010.
Colección:Information Security and Cryptography,
Temas:
Acceso en línea:Texto Completo