This book describes how many different computational tasks can be solved securely, yet efficiently. It describes how protocols can be combined to larger applications, and how the security-efficiency trade-offs of different components of an secure multi-party computation (SMC) application should be chosen.
Read More
This book describes how many different computational tasks can be solved securely, yet efficiently. It describes how protocols can be combined to larger applications, and how the security-efficiency trade-offs of different components of an secure multi-party computation (SMC) application should be chosen.
Read Less
Add this copy of Applications of Secure Multiparty Computation to cart. £138.45, good condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2015 by SAGE Publications Ltd.
Add this copy of Applications of Secure Multiparty Computation to cart. £174.44, new condition, Sold by Just one more Chapter rated 4.0 out of 5 stars, ships from Miramar, FL, UNITED STATES, published 2015 by SAGE Publications Ltd.
Add this copy of Applications of Secure Multiparty Computation to cart. £175.76, new condition, Sold by Bonita rated 4.0 out of 5 stars, ships from Santa Clarita, CA, UNITED STATES, published 2015 by SAGE Publications Ltd.