Nu se pretează? Nu contează! La noi puteți returna bunurile în 30 de zile
Cu un voucher cadou nu veți da greș. În schimbul voucherului, destinatarul își poate alege orice din oferta noastră.
30 de zile pentru retur bunuri
The authors present a comprehensive study of efficient protocols and techniques for secure two-party computation. They study both general constructions that can be used to securely compute any functionality, and protocols for specific problems of interest. The aim of the book is to focus on techniques for both constructing protocols and proving them secure. In addition, the authors study the different definitional paradigms used and compare the efficiency of protocols achieved under these different definitions. §This book is essential for practitioners and researchers in the field of secure protocols, particularly those with a focus on efficiency, and for researchers in the area of privacy-preserving data mining.