"Efficient Secure Two-Party Computation with Untrusted Hardware Tokens ..."

Kimmo Järvinen et al. (2010)

Details and statistics

DOI: 10.1007/978-3-642-14452-3_17

access: closed

type: Part in Book or Collection

metadata version: 2018-11-02

a service of  Schloss Dagstuhl - Leibniz Center for Informatics