Composition of Secure Multi-Party Protocols A Comprehensive Study /
In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results asser...
Κύριος συγγραφέας: | Lindell, Yehuda (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut) |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | SpringerLink (Online service) |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2003.
|
Έκδοση: | 1st ed. 2003. |
Σειρά: | Lecture Notes in Computer Science,
2815 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Παρόμοια τεκμήρια
-
Security Protocols 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers /
Έκδοση: (2004) -
Security Protocols 9th International Workshop, Cambridge, UK, April 25-27, 2001 Revised Papers /
Έκδοση: (2002) -
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings /
Έκδοση: (2003) -
Applied Cryptography and Network Security First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings /
Έκδοση: (2003) -
Privacy Enhancing Technologies Third International Workshop, PET 2003, Dresden, Germany, March 26-28, 2003, Revised Papers /
Έκδοση: (2003)