Loading…

Efficient secure two-party protocols techniques and constructions /

The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation - both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The book focuses on techniques for constructing effic...

Full description

Saved in:
Bibliographic Details
Main Author: Hazay, Carmit
Corporate Author: SpringerLink (Online service)
Other Authors: Lindell, Yehuda
Format: eBook
Language:English
Published: New York : Springer, 2010.
New York : 2010.
Edition:1st ed.
Series:Information security and cryptography.
Physical Description:
1 online resource (xiii, 263 pages) : illustrations (some color).
Subjects:
Online Access:SpringerLink - Click here for access
Holdings details from CMU Electronic Access C502
Copy 1 CMU Electronic Access Available

Internet

SpringerLink - Click here for access