:: eBooks :: Kembali

eBooks :: Kembali

Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation

Thomas Schneider (Springer-Verlag, 2012)

 Abstrak

The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols.

 File Digital: 1

Shelf
 Engineering Secure Two-Party Computation Protocols.pdf :: Unduh

LOGIN required

 Metadata

No. Panggil : e20410461
Entri utama-Nama orang :
Subjek :
Penerbitan : Berlin: Springer-Verlag, 2012
Sumber Pengatalogan: LibUI eng rda
Tipe Konten: text
Tipe Media: computer
Tipe Pembawa: online resource
Deskripsi Fisik:
Tautan: http://link.springer.com/book/10.1007%2F978-3-642-30042-4
Lembaga Pemilik:
Lokasi:
  • Ketersediaan
  • Ulasan
No. Panggil No. Barkod Ketersediaan
e20410461 TERSEDIA
Ulasan:
Tidak ada ulasan pada koleksi ini: 20410461