We can't find the internet
Attempting to reconnect
Something went wrong!
Hang in there while we get back on track
£91.15
Springer Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation
Price data last checked 19 day(s) ago - will refresh soon
Price History & Forecast
Last 72 days • 72 data points (No recent data available)
Price Distribution
Price distribution over 72 days • 2 price levels
Price Analysis
Most common price: £89 (68 days, 94.4%)
Price range: £89 - £91
Price levels: 2 different prices over 72 days
Description
Product Specifications
- Brand
- Springer
- Format
- paperback
- ASIN
- 3642300413
- Domain
- Amazon UK
- Release Date
- 04 August 2012
- Listed Since
- 05 April 2012
Barcode
No barcode data available
Similar Products You Might Like
Applied Cryptography: Protocols, Algorithms and Source Code in C
Wiley
Protocols for Authentication and Key Establishment (Information Security and Cryptography)
Springer
Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, ... (Lecture Notes in Computer Science, 14081)
Springer
Classical and Physical Security of Symmetric Key Cryptographic Algorithms (Computer Architecture and Design Methodologies)
Springer
Partially Homomorphic Encryption
Springer
Practical Cryptography: Algorithms and Implementations Using C++
CRC Press
Advances in Cryptology – EUROCRYPT ’95: International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May ... 921 (Lecture Notes in Computer Science, 921)
Springer
Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004, Proceedings: 3156 (Lecture Notes in Computer Science, 3156)
Springer
Advances in Cryptology – CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, ... (Lecture Notes in Computer Science, 12827)
Springer
Physical-Layer Security and Quantum Key Distribution
Springer
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
Springer
System-on-Chip Architectures and Implementations for Private-Key Data Encryption
Springer
Cryptographic Security Architecture: Design and Verification
Springer
Protecting Privacy through Homomorphic Encryption
Springer
Controlling Privacy and the Use of Data Assets - Volume 1: Who Owns the New Oil? (Security, Audit and Leadership Series)
CRC Press
Disappearing Cryptography: Information Hiding: Steganography & Watermarking: Information Hiding: Steganography and Watermarking (The Morgan Kaufmann Series in Software Engineering and Programming)
Morgan Kaufmann
Elliptic Curve Cryptography as suitable solution for mobile devices: Elliptic Curve Cryptography
LAP Lambert Academic Publishing
Fault Analysis in Cryptography (Information Security and Cryptography)
Springer
Information Security of Intelligent Vehicles Communication: Overview, Perspectives, Challenges, and Possible Solutions: 978 (Studies in Computational Intelligence, 978)
Springer
Design and Analysis of Cryptographic Algorithms in Blockchain
CRC Press
Physical and Data-Link Security Techniques for Future Communication Systems: 358 (Lecture Notes in Electrical Engineering, 358)
Springer
Codes, Cryptology and Curves with Computer Algebra
Cambridge University Press
Sicherheit für Videodaten (Multimedia-Engineering)
Vieweg+Teubner Verlag
Introduction to Public Key Infrastructures
Springer