Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Engineering Secure Two-Party Computation Protocols

Best Price (Coupon Required):
Buy Engineering Secure Two-Party Computation Protocols for $89.10 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $99.00 - $99.00
BEST PRICE

Single Product Purchase

$89.10
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$99.00 $99.00

10% OFF
This deals requires coupon
$89.10
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783642300424
Condition
New
Product Description

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Posttranslational Modification of Proteins

Posttranslational Modification of Proteins

$84.99
Middleware in Java

Middleware in Java

$34.99
Masterkurs Verteilte betriebliche Informationssysteme

Masterkurs Verteilte betriebliche Informationssysteme

$39.99
MRI of Gynaecological Diseases

MRI of Gynaecological Diseases

$169.99
Corneal Emergencies

Corneal Emergencies

$84.99
Vorlesungen ber Baustatik

Vorlesungen ber Baustatik

$44.99
Global Change: Impacts on Water and food Security

Global Change: Impacts on Water and food Security

$109.99
There Was an Old Lady: Un da una seora se trag un dragn!

There Was an Old Lady: Un da una seora se trag un dragn!

$5.24
Event-Based State Estimation

Event-Based State Estimation

$109.99
Building from Scrap

Building from Scrap

$59.99
3D Printing in Plastic Reconstructive and Aesthetic Surgery

3D Printing in Plastic Reconstructive and Aesthetic Surgery

$39.99
Ultraschalldiagnostik in Geburtshilfe und Gynkologie

Ultraschalldiagnostik in Geburtshilfe und Gynkologie

$249.99
Integration of Fundamental Polymer Science and Technology3

Integration of Fundamental Polymer Science and Technology3

$39.99
GeNeDis 2022

GeNeDis 2022

$189.00
42 V-PowerNets

42 V-PowerNets

$39.99
Recommender Systems for Learning

Recommender Systems for Learning

$64.99
The World Reshaped

The World Reshaped

$39.99
The Potato Genome

The Potato Genome

$199.99
Pharmazeutisches Tier-Manual

Pharmazeutisches Tier-Manual

$59.99
IUTAM Symposium on Computational Methods in Contact Mechanics

IUTAM Symposium on Computational Methods in Contact Mechanics

$169.99
Teheran

Teheran

$69.95
Verstrkermetechnik

Verstrkermetechnik

$79.99
Wirtschaftskulturen und Genossenschaften im vereinten Europa

Wirtschaftskulturen und Genossenschaften im vereinten Europa

$59.99
Optical Transmission

Optical Transmission

$109.99
Software Product Lines

Software Product Lines

$89.99
Chembiomolecular Science

Chembiomolecular Science

$169.00
The Biology of Estuarine Management

The Biology of Estuarine Management

$39.99
Heavy-Duty-, On- und Off-Highway-Motoren 2022

Heavy-Duty-, On- und Off-Highway-Motoren 2022

$149.99
Psychosis and Personality Disorders

Psychosis and Personality Disorders

$109.99
Asymptotic Theory of Statistics and Probability

Asymptotic Theory of Statistics and Probability

$129.99
Principles and Practice of Modern Radiotherapy Techniques in Breast Cancer

Principles and Practice of Modern Radiotherapy Techniques in Breast Cancer

$219.99
Physics of Quantum Rings

Physics of Quantum Rings

$84.99
Risikomanagement in Bau- und Immobilienprojekten

Risikomanagement in Bau- und Immobilienprojekten

$49.99
High-Dimensional and Low-Quality Visual Information Processing

High-Dimensional and Low-Quality Visual Information Processing

$39.99
Sicherheit bei Kranen

Sicherheit bei Kranen

$119.99
Metastasis

Metastasis

$39.99
Evolution, Development and Complexity

Evolution, Development and Complexity

$249.99
Social Robotics

Social Robotics

$39.99
Machine Learning in Educational Sciences

Machine Learning in Educational Sciences

$169.99
Spezialisierung im Journalismus

Spezialisierung im Journalismus

$39.99
previous
next