×
  • Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation

    Thomas Schneider (auth.)

Click on cover to enlarge.
Buy This Book
From Amazon.
3 - 4Hours to read