(2012). Engineering secure two-party computation protocols: Design, optimization, and applications of efficient secure function evaluation.
Chicago Style CitationEngineering Secure Two-party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. 2012.
MLA CitationEngineering Secure Two-party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. 2012.
Warning: These citations may not always be 100% accurate.