Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Engineering Secure Twoparty Computation Protocols Design Optimization And Applications Of Efficient Secure Function EvaluationEngineering Secure Twoparty Computation Protocols Design Optimization And Applications Of Efficient Secure Function Evaluation

Engineering Secure Twoparty Computation Protocols Design Optimization And Applications Of Efficient Secure Function Evaluation

Thomas Schneider

Details

OL Work ID
OL17508218W

Subjects

Computer network protocolsData encryption (computer science)Computer networks, security measuresComputer scienceComputer network architecturesData structures (computer science)Telecommunication

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.