SFr. 69.00
€ 74.52
BTC 0.0012
LTC 1.003
ETH 0.0254


bestellen

Artikel-Nr. 1729188


Diesen Artikel in meine
Wunschliste
Diesen Artikel
weiterempfehlen
Diesen Preis
beobachten

Weitersagen:



Autor(en): 
  • Yehuda Lindell
  • Composition of Secure Multi-Party Protocols: A Comprehensive Study 
     

    (Buch)
    Dieser Artikel gilt, aufgrund seiner Grösse, beim Versand als 2 Artikel!


    Übersicht

    Auf mobile öffnen
     
    Lieferstatus:   i.d.R. innert 5-10 Tagen versandfertig
    Veröffentlichung:  September 2003  
    Genre:  EDV / Informatik 
     
    C / Computer Communication Networks / Computer communication systems / computer science / Computers and civilization / Computers and Society / Cryptology / Data encryption / Data encryption (Computer science) / Ethical & social aspects of IT / information architecture / IT Operations / Maintenance & repairs / Management information systems / Management of Computing and Information Systems / Network hardware / Operating systems / Operating systems (Computers)
    ISBN:  9783540201052 
    EAN-Code: 
    9783540201052 
    Verlag:  Springer Berlin Heidelberg 
    Einband:  Kartoniert  
    Sprache:  English  
    Serie:  #2815 - Lecture Notes in Computer Science  
    Dimensionen:  H 235 mm / B 155 mm / D 12 mm 
    Gewicht:  335 gr 
    Seiten:  216 
    Zus. Info:  Paperback 
    Bewertung: Titel bewerten / Meinung schreiben
    Inhalt:
    In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols.

      



    Wird aktuell angeschaut...
     

    Zurück zur letzten Ansicht


    AGB | Datenschutzerklärung | Mein Konto | Impressum | Partnerprogramm
    Newsletter | 1Advd.ch RSS News-Feed Newsfeed | 1Advd.ch Facebook-Page Facebook | 1Advd.ch Twitter-Page Twitter
    Forbidden Planet AG © 1999-2024
    Alle Angaben ohne Gewähr
     
    SUCHEN

     
     Kategorien
    Im Sortiment stöbern
    Genres
    Hörbücher
    Aktionen
     Infos
    Mein Konto
    Warenkorb
    Meine Wunschliste
     Kundenservice
    Recherchedienst
    Fragen / AGB / Kontakt
    Partnerprogramm
    Impressum
    © by Forbidden Planet AG 1999-2024
    Jetzt auch mit LiteCoin bestellen!