TU Darmstadt / ULB / TUbiblio

Efficient Secure Two-Party Computation with Untrusted Hardware Tokens

Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas (2010):
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens.
In: Towards Hardware Intrinsic Security: Foundation and Practice, Springer-Verlag Berlin Heidelberg, pp. 367-386, DOI: 10.1007/978-3-642-14452-3_17,
[Book Section]

Item Type: Book Section
Erschienen: 2010
Creators: Järvinen, Kimmo and Kolesnikov, Vladimir and Sadeghi, Ahmad-Reza and Schneider, Thomas
Title: Efficient Secure Two-Party Computation with Untrusted Hardware Tokens
Language: English
Title of Book: Towards Hardware Intrinsic Security: Foundation and Practice
Series Name: Information Security and Cryptography
Publisher: Springer-Verlag Berlin Heidelberg
Divisions: 20 Department of Computer Science
20 Department of Computer Science > Cryptography and Privacy Engineering (ENCRYPTO)
20 Department of Computer Science > System Security Lab
Zentrale Einrichtungen
20 Department of Computer Science > EC SPRIDE
20 Department of Computer Science > EC SPRIDE > Engineering Cryptographic Protocols (am 01.03.2018 in Cryptography and Privacy Engineering)
Date Deposited: 25 Jun 2012 13:23
DOI: 10.1007/978-3-642-14452-3_17
Export:

Optionen (nur für Redakteure)

View Item View Item