APA-Zitierstil (7. Ausg.)

Schneider, T. (2012). Engineering secure two-party computation protocols: Design, optimization, and applications of efficient secure function evaluation. Springer.

Chicago-Zitierstil (17. Ausg.)

Schneider, Thomas. Engineering Secure Two-party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Berlin [u.a.]: Springer, 2012.

MLA-Zitierstil (9. Ausg.)

Schneider, Thomas. Engineering Secure Two-party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer, 2012.

Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.