Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Engineering Secure Two-Party Computation Protocols

Design, Optimization, and Applications of Efficient Secure Function Evaluation
BuchKartoniert, Paperback
138 Seiten
Englisch
Springererschienen am04.08.2012
Here is an extensive overview of practical and efficient modern techniques for design and implementation of secure computation and related protocols. Covers circuit optimization, hardware-assisted garbled circuit protocols and modular design of SFE protocols.mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR128,39
E-BookPDF1 - PDF WatermarkE-Book
EUR117,69

Produkt

KlappentextHere is an extensive overview of practical and efficient modern techniques for design and implementation of secure computation and related protocols. Covers circuit optimization, hardware-assisted garbled circuit protocols and modular design of SFE protocols.
Details
ISBN/GTIN978-3-642-30041-7
ProduktartBuch
EinbandartKartoniert, Paperback
Verlag
Erscheinungsjahr2012
Erscheinungsdatum04.08.2012
Seiten138 Seiten
SpracheEnglisch
Gewicht248 g
IllustrationenXVI, 138 p. 35 illus.
Artikel-Nr.17835576

Inhalt/Kritik

Inhaltsverzeichnis
Chap. 1, Introduction.- Chap. 2, Basics of Practically Efficient Secure Function Evaluation.- Chap. 3, Circuit Optimizations and Constructions.- Chap. 4, Hardware-Assisted Garbled Circuit Protocols.- Chap. 5, Modular Design of Efficient SFE Protocols.- Chap. 6, Conclusions.- References.- Index.mehr
Kritik
From the reviews:

"This book, an elaboration of the author's PhD thesis, presents alternative approaches to the development of secure two-party computation protocols based on secure function evaluation (SFE). ... Directions for future research are offered and a comprehensive bibliography is provided. In a nutshell, this is an interesting book that could be used in a vertical way by implementers, practitioners, and graduate students. Security practitioners could use it in broader terms to support their horizon scanning techniques for emerging technologies." (Alessandro Berni, ACM Computing Reviews, December, 2012)
mehr

Schlagworte

Autor

Dr.-Ing. Thomas Schneider heads the Engineering Cryptographic Protocols group at the European Center for Security and Privacy by Design (EC-SPRIDE) at Technische Universität Darmstadt, Germany. He received his PhD from Ruhr-Universität Bochum, Germany. His research interests cover applied cryptography and information security, and in particular secure computation and related protocols.