Engineering secure two-party computation protocols : design, optimization, and applications of efficient secure function evaluation
Thomas Schneider (Springer-Verlag, 2012)
|
The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. |
Engineering Secure Two-Party Computation Protocols.pdf :: Unduh
|
No. Panggil : | e20410461 |
Entri utama-Nama orang : | |
Subjek : | |
Penerbitan : | Berlin: Springer-Verlag, 2012 |
Sumber Pengatalogan: | LibUI eng rda |
Tipe Konten: | text |
Tipe Media: | computer |
Tipe Pembawa: | online resource |
Deskripsi Fisik: | |
Tautan: | http://link.springer.com/book/10.1007%2F978-3-642-30042-4 |
Lembaga Pemilik: | |
Lokasi: |
No. Panggil | No. Barkod | Ketersediaan |
---|---|---|
e20410461 | TERSEDIA |
Ulasan: |
Tidak ada ulasan pada koleksi ini: 20410461 |