Efficient Secure Two-Party Protocols Techniques and Constructions /
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation - both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing effic...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | Hazay, Carmit (Autor), Lindell, Yehuda (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Information Security and Cryptography,
|
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Data Warehousing and Data Mining Techniques for Cyber Security
por: Singhal, Anoop
Publicado: (2007) -
Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings /
Publicado: (2008) -
Cognitive (Internet of) Things Collaboration to Optimize Action /
por: Sathi, Arvind
Publicado: (2016) -
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS OTM Confederated International Conferences, CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part I /
Publicado: (2007) -
Data Warehousing and Knowledge Discovery 9th International Conference, DaWaK 2007, Regensburg, Germany, September 3-7, 2007, Proceedings /
Publicado: (2007)