Efficient Secure Two-Party Protocols Techniques and Constructions /
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation – both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing effic...
Κύριοι συγγραφείς: | Hazay, Carmit (Συγγραφέας), Lindell, Yehuda (Συγγραφέας) |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | SpringerLink (Online service) |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Information Security and Cryptography,
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Παρόμοια τεκμήρια
-
Efficient Secure Two-Party Protocols Techniques and Constructions
ανά: Hazay, Carmit
Έκδοση: (2010) -
Data Warehousing and Data Mining Techniques for Cyber Security
ανά: Singhal, Anoop
Έκδοση: (2007) -
Visualization for Computer Security 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings /
Έκδοση: (2008) -
Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation /
ανά: Schneider, Thomas
Έκδοση: (2012) -
String Processing and Information Retrieval 16th International Symposium, SPIRE 2009 Saariselkä, Finland, August 25-27, 2009 Proceedings /
Έκδοση: (2009)