eBooks :: Back

eBooks :: Back

Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation

Thomas Schneider (Springer-Verlag, 2012)

 Abstract

The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols.

 Digital Files: 1

Shelf
 Engineering Secure Two-Party Computation Protocols.pdf :: Download

LOGIN required

 Metadata

Collection Type : eBooks
Call Number : e20410461
Main entry-Personal name :
Subject :
Publishing : Berlin: Springer-Verlag, 2012
Responsibility Statement Thomas Schneider
Language Code eng
Edition
Collection Source e-Book BOPTN 2013
Cataloguing Source LibUI eng rda
Content Type text
Media Type computer
Carrier Type online resource
Physical Description
Link http://link.springer.com/book/10.1007%2F978-3-642-30042-4
  • Availability
  • Review
  • Cover
Call Number Barcode Number Availability
e20410461 TERSEDIA
Review:
No review available for this collection: 20410461
Cover