[PDF] secure computation free ebooks download




View results: Search for a phrase:
ISBN Language MD5 Extension

Library Search


8 books found also search"secure computation" in ,
ID Author(s) Title Publisher Year Pages Language Size Extension GET
1587038 Sumit Chakraborty Sumit Chakraborty - Secure Multi-party Computation for Electronic and Mobile Commerce in Digital Economy Business Analytics Research Lab India 2015 English 440 kb pdf GET
1384417 Sumit Chakraborty Bioterrorism, Threat Analytics and Secure Multi-party Computation [1 ed.] Business Analytics Research Lab India 2013 10 English 425 kb pdf GET
1468447 Roman Gumzej (auth.) Studies in Computational Intelligence 632
Engineering Safe and Secure Cyber-Physical Systems: The Specification PEARL Approach [1 ed.]
978-3-319-28903-8, 978-3-319-28905-2
Springer International Publishing 2016 XIII, 128 English 3 Mb pdf GET
944201 Thomas Schneider (auth.) Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation [1 ed.]
978-3-642-30041-7, 978-3-642-30042-4
Springer-Verlag Berlin Heidelberg 2012 138 English 4 Mb pdf GET
341277 Richard A. DeMillo, etc. Foundations of Secure Computation
0122103505, 9780122103506
Academic Press Inc 1978 157 English 1 Mb djvu GET
942430 Bo An, Kwang Mong Sim, Liang Gui Tang, Chun Yan Miao, Zhi Qi Shen, Dai Jie Cheng (auth.), Associate Professor Takayuki Ito, Assistant Professor Hiromitsu Hattori, Associate Professor Minjie Zhang, Associate Professor Tokuro Matsuo (eds.) Studies in Computational Intelligence 89
Rational, Robust, and Secure Negotiations in Multi-Agent Systems [1 ed.]
978-3-540-76281-2, 978-3-540-76282-9
Springer-Verlag Berlin Heidelberg 2008 184 English 6 Mb pdf GET
1564307 Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen Secure Multiparty Computation and Secret Sharing [1 ed.]
1107043050, 9781107043053
Cambridge University Press 2015 381 English 3 Mb epub GET
1537929 Ronald Cramer, Ivan Bjerre Damgård, Jesper Buus Nielsen Secure Multiparty Computation and Secret Sharing (Book Draft, April 30, 2014) [1 ed.]
1107043050, 9781107043053
Cambridge University Press 2015 381 English 3 Mb pdf GET

If no results, Please search secure computation here Again

 Michael R. Barnes, Ian C. Gray
George J. Klir
Peter Bürgisser, Michael Clausen, Mohammad Amin Shokrollahi (auth.)
Молотов Е.П.
Беляев Н.М.
Jacobi C.G.J.
Peter McMullen, Egon Schulte
Stanley N. Burris
E.J. Barbeau
Эскей Р. (R.Askey)
Henrici P.
Steven G. Krantz
Крейн С., Ушакова В.
Michael Gil
Гельфанд И.М., Граев М.И., Виленкин Н.Я.
Legendre A.M.
Hilbert D., Cohn-Vossen S.
Kleiman S.L.
Richard Evan Schwartz
Громов.

self organizationoccupational safetyforest fragmentationliveanxietyvisibilityreal time systemst cell receptorroom temperaturedistributed databasesaccuracycoppertemperatureresonanceelectromagnetic radiationstochastic controlnatural gasjournalismobject orientedcytochrome ccomputational modelinghistogramsmass transfersystem level designultrasonic transducersbiologychemical bondingvasoactive intestinal peptideground statepredicatehigh resolutionveterinarynuclear magnetic resonancecross sectionfault detectionshort tandem repeatbeta minus decaygenetic variationnuclear receptorhotspotviral tropismforcecentral processing unitinformation technologyx ray diffractionphosphorylationnatural languagesabstract data typehigh energy physics