Inicio > > Redes y comunicaciones informáticas > Engineering Secure Two-Party Computation Protocols
Engineering Secure Two-Party Computation Protocols

Engineering Secure Two-Party Computation Protocols

Thomas Schneider

145,50 €
IVA incluido
Disponible
Editorial:
Springer Nature B.V.
Año de edición:
2012
Materia
Redes y comunicaciones informáticas
ISBN:
9783642300417
145,50 €
IVA incluido
Disponible

Selecciona una librería:

  • Librería Samer Atenea
  • Librería Aciertas (Toledo)
  • Kálamo Books
  • Librería Perelló (Valencia)
  • Librería Elías (Asturias)
  • Donde los libros
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios.The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author’s research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.

Artículos relacionados

  • Next Generation Search Engines
    Recent technological progress in computer science, Web technologies, and the constantly evolving information available on the Internet has drastically changed the landscape of search and access to information. Current search engines employ advanced techniques involving machine learning, social networks, and semantic analysis. Next Generation Search Engines: Advanced Models for ...
    Disponible

    256,63 €

  • Collaboration and the Semantic Web
    Collaborative working has been increasingly viewed as a good practice for organizations to achieve efficiency. Organizations that work well in collaboration may have access to new sources of funding, deliver new, improved, and more integrated services, make savings on shared costs, and exchange knowledge, information and expertise. Collaboration and the Semantic Web: Social Net...
    Disponible

    229,92 €

  • Resource Allocation in Next-Generation Broadband Wireless Access Networks
    With the growing popularity of wireless networks in recent years, the need to increase network capacity and efficiency has become more prominent in society. This has led to the development and implementation of heterogeneous networks. Resource Allocation in Next-Generation Broadband Wireless Access Networks is a comprehensive reference source for the latest scholarly research o...
    Disponible

    249,42 €

  • Advanced Topics in Information Technology Standards and Standardization Research, Volume 1
    Kai Jakobs
    ...
    Disponible

    118,72 €

  • Data Warehouses and OLAP
    ...
    Disponible

    118,72 €

  • Selected Readings on Database Technologies and Applications
    Terry Halpin
    Education and research in the field of database technology can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Database Technologies and Applications supplements course instruction and student research with quality chapters focused on key issues concerning the development, design, and analysis ...
    Disponible

    256,64 €

Otros libros del autor

  • Berufliche Möglichkeiten im Ruhestand
    Thomas Schneider
    Die geburtenstärksten Jahrgänge der 1960er Jahre erreichen das Ruhestandsalter. Damit steigt die Anzahl von Menschen an, die sich mit dem Buchthema auseinandersetzen (müssen). Sie sind aktiv, wollen aktiv bleiben. Einige müssen, viele können noch beruflich tätig sein. Nach dem Eintritt in den Ruhestand fehlt oft eine klare Tagesstruktur, soziale Kontakte nehmen ab und zusätzlic...
    Disponible

    38,36 €

  • Digitalization and Artificial Intelligence
    Thomas Schneider
    The possibilities and limits of digitalization in general and artificial intelligence in particular are demonstrated in a practice-oriented manner. Ways to generate and secure competitive advantages are presented. The topic is examined from the perspective of the company, the function of controlling and the personal position in controlling. The aim is rather to accompany the re...
    Disponible

    48,68 €

  • Digitalization and Artificial Intelligence
    Thomas Schneider
    The possibilities and limits of digitalization in general and artificial intelligence in particular are demonstrated in a practice-oriented manner. Ways to generate and secure competitive advantages are presented. The topic is examined from the perspective of the company, the function of controlling and the personal position in controlling. The aim is rather to accompany the re...
    Disponible

    85,57 €

  • Tools of Effective Compliance
    Thomas Schneider
     Unlike many standard works on compliance, this book focuses not on the goals, but on the means that enable effective compliance. From the internal perspective of the compliance officer, everyday problems are addressed and solved with the help of concrete, tried-and-tested measures. Based on the tension between profit generation and compliance, ethical principles as well as the...
    Disponible

    84,91 €

  • Werkzeuge wirkungsvoller Compliance
    Thomas Schneider
    Im Mittelpunkt dieses Buches stehen, anders als bei vielen Standardwerken zur Compliance, nicht die Ziele, sondern die Mittel, die eine wirkungsvolle Compliance ermöglichen. Aus der Innensicht des Compliance Officer werden alltägliche Probleme thematisiert und anhand konkreter, praxiserprobter Maßnahmen gelöst. Ausgehend vom Spannungsfeld zwischen Gewinnerzielung und Compliance...
    Disponible

    66,36 €

  • A Physician’s Apology
    Thomas Schneider
    In A Physician’s Apology, Dr. Tom Schneider exposes medical myths and urges readers to take responsibility for their own health, all while unveiling this truth: there are practical and proven steps that can be taken toward living a healthier, longer, and, yes ... happier life. No stranger to personal health issues himself, Dr. Tom has devoted decades of exhaustive exploration a...
    Disponible

    13,95 €