Authors:
- Essential reading for researchers in the area of secure protocols
- The authors compare the efficiencies of different protocols Essential reading for researchers in the area of privacy-preserving data mining
- Includes supplementary material: sn.pub/extras
Part of the book series: Information Security and Cryptography (ISC)
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (9 chapters)
-
Front Matter
-
Introduction and Definitions
-
Front Matter
-
-
General Constructions
-
Front Matter
-
-
Specific Constructions
-
Front Matter
-
-
Back Matter
About this book
Reviews
Authors and Affiliations
-
, Department of Computer Science, Weizmann Institute, Rehovot, Israel
Carmit Hazay
-
Department of Computer Science, Bar Ilan University, Ramat Gan, Israel
Yehuda Lindell
Bibliographic Information
Book Title: Efficient Secure Two-Party Protocols
Book Subtitle: Techniques and Constructions
Authors: Carmit Hazay, Yehuda Lindell
Series Title: Information Security and Cryptography
DOI: https://doi.org/10.1007/978-3-642-14303-8
Publisher: Springer Berlin, Heidelberg
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag Berlin Heidelberg 2010
Hardcover ISBN: 978-3-642-14302-1Published: 04 November 2010
Softcover ISBN: 978-3-642-26576-1Published: 02 January 2013
eBook ISBN: 978-3-642-14303-8Published: 02 November 2010
Series ISSN: 1619-7100
Series E-ISSN: 2197-845X
Edition Number: 1
Number of Pages: XIII, 263
Topics: Programming Techniques, Computer Communication Networks, Data Mining and Knowledge Discovery, Data Structures and Information Theory