Schneider, T. (2012). Engineering secure two-party computation protocols: Design, optimization, and applications of efficient secure function evaluation. Springer.
Chicago Style (17th ed.) CitationSchneider, Thomas. Engineering Secure Two-party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Berlin: Springer, 2012.
MLA (9th ed.) CitationSchneider, Thomas. Engineering Secure Two-party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer, 2012.
Warning: These citations may not always be 100% accurate.