APA (7th ed.) Citation

Schneider, T. (2012). Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer Berlin Heidelberg : Imprint: Springer.

Chicago Style (17th ed.) Citation

Schneider, Thomas. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Berlin, Heidelberg: Springer Berlin Heidelberg : Imprint: Springer, 2012.

MLA (8th ed.) Citation

Schneider, Thomas. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer Berlin Heidelberg : Imprint: Springer, 2012.

Warning: These citations may not always be 100% accurate.