Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Composition of Secure Multi-Party ProtocolsComposition of Secure Multi-Party Protocols

Composition of Secure Multi-Party Protocols

Yehuda Lindell

About this book

"This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols."--Jacket.

Details

OL Work ID
OL9240406W

Subjects

ComputersComputer securityAccess controlComputers, access controlComputer scienceComputer networksOperating systems (Computers)Data encryption (Computer science)

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.