Kód: 01656212
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for spec ... celý popis
Nákupem získáte 486 bodů
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The aim of the book is to focus on techniques for both constructing protocols and proving them secure. In addition, the authors study the different definitional paradigms used and compare the efficiency of protocols achieved under these different definitions. §This book is essential for practitioners and researchers in the field of secure protocols, particularly those with a focus on efficiency, and for researchers in the area of privacy-preserving data mining.
Zařazení knihy Knihy v angličtině Computing & information technology Computer hardware Network hardware
4859 Kč
Osobní odběr Praha, Brno a 12903 dalších
Copyright ©2008-24 nejlevnejsi-knihy.cz Všechna práva vyhrazenaSoukromíCookies
Nákupní košík ( prázdný )