Efficient Secure Two-Party Protocols Techniques and Constructions /
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing effic...
| Main Authors: | Hazay, Carmit (Author), Lindell, Yehuda (Author) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
| Series: | Information Security and Cryptography,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Efficient Secure Two-Party Protocols Techniques and Constructions
by: Hazay, Carmit
Published: (2010) -
Data Warehousing and Data Mining Techniques for Cyber Security
by: Singhal, Anoop
Published: (2007) -
Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
Published: (2008) -
Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation /
by: Schneider, Thomas
Published: (2012) -
String Processing and Information Retrieval 16th International Symposium, SPIRE 2009 Saariselkä, Finland, August 25-27, 2009 Proceedings /
Published: (2009)