Schneider, T. (2012). Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer. https://doi.org/10.1007/978-3-642-30042-4
Chicago Style (17th ed.) CitationSchneider, Thomas. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Heidelberg [u.a.]: Springer, 2012. https://doi.org/10.1007/978-3-642-30042-4.
MLA (9th ed.) CitationSchneider, Thomas. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer, 2012. https://doi.org/10.1007/978-3-642-30042-4.
Warning: These citations may not always be 100% accurate.