(2012). Engineering secure two-party computation protocols: Design, optimization, and applications of efficient secure function evaluation.
Citación estilo ChicagoEngineering Secure Two-party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. 2012.
Cita MLAEngineering Secure Two-party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. 2012.
Precaución: Estas citas no son 100% exactas.