1325 results in Communications, Information Theory and Security
9 - Applications of MPC
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 182-200
-
- Chapter
- Export citation
3 - MPC Protocols with Passive Security
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 32-50
-
- Chapter
- Export citation
List of Algorithms
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 355-356
-
- Chapter
- Export citation
11 - Secret Sharing
- from Part II - Secret Sharing
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 236-298
-
- Chapter
- Export citation
12 - Arithmetic Codices
- from Part II - Secret Sharing
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 299-354
-
- Chapter
- Export citation
Preface
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp ix-x
-
- Chapter
- Export citation
References
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 359-368
-
- Chapter
- Export citation
Secure Multiparty Computation and Secret Sharing
-
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015
Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 1-2
-
- Chapter
- Export citation
Part II - Secret Sharing
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 201-202
-
- Chapter
- Export citation
List of Exercises
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 357-358
-
- Chapter
- Export citation
4 - Models
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 51-103
-
- Chapter
- Export citation
Contents
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp v-viii
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp i-iv
-
- Chapter
- Export citation
8 - Some Techniques for Efficiency Improvements
- from Part I - Secure Multiparty Computation
-
- Book:
- Secure Multiparty Computation and Secret Sharing
- Published online:
- 05 August 2015
- Print publication:
- 15 July 2015, pp 163-181
-
- Chapter
- Export citation
7 - Percolation Theory
-
- Book:
- Random Wireless Networks
- Published online:
- 05 May 2015
- Print publication:
- 13 April 2015, pp 146-175
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Random Wireless Networks
- Published online:
- 05 May 2015
- Print publication:
- 13 April 2015, pp 1-11
-
- Chapter
- Export citation
3 - Multiple Antennas
-
- Book:
- Random Wireless Networks
- Published online:
- 05 May 2015
- Print publication:
- 13 April 2015, pp 43-79
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Random Wireless Networks
- Published online:
- 05 May 2015
- Print publication:
- 13 April 2015, pp i-ii
-
- Chapter
- Export citation
List of Figures
-
- Book:
- Random Wireless Networks
- Published online:
- 05 May 2015
- Print publication:
- 13 April 2015, pp vii-x
-
- Chapter
- Export citation