The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation.
CITATION STYLE
Hazay, C., & Lindell, Y. (2010). Efficient Secure Two-Party Protocols. Information Security (pp. 53–80). Berlin, Heidelberg: Springer Berlin Heidelberg. Retrieved from http://www.springerlink.com/index/10.1007/978-3-642-14303-8
Mendeley helps you to discover research relevant for your work.