44
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Foundations and Practice of Security 

      An Efficient Protocol for Secure Two-Party Computation in the Presence of Malicious Adversaries

      other
      ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Author and book information

          Book Chapter
          2007
          : 52-78
          10.1007/978-3-540-72540-4_4
          7fba4dd3-859d-474c-9370-bac382b458ad
          History

          Comments

          Comment on this book

          Book chapters

          Similar content2,139

          Cited by50