Engineering secure two-party computation protocols : Design, optimization, and applications of efficient secure function evaluation /
<p>Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be...
Saved in:
Main Author: | Schneider, Thomas (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2012.
|
Subjects: | |
Online Access: | Click here to view the full text content |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Efficient secure two-party protocols techniques and constructions /
by: Hazay, Carmit
Published: (2010) -
Operational semantics and verification of security protocols /
by: Cremers, Cas
Published: (2012) -
Cryptographic protocol : security analysis based on trusted freshness /
by: Dong, Ling
Published: (2012) -
Synchronizing internet protocol security (SIPSec)
by: Shoniregun, Charles A.
Published: (2007) -
Efficient secure two-party protocols techniques and constructions
by: Hazay, Carmit
Published: (2010)