Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/spw/Dong15a
%A Dong, Changyu
%B Security Protocols Workshop
%D 2015
%E Christianson, Bruce
%E Svenda, Petr
%E Matyás, Vashek
%E Malcolm, James A.
%E Stajano, Frank
%E Anderson, Jonathan
%I Springer
%K
%P 361-363
%T Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion).
%U http://dblp.uni-trier.de/db/conf/spw/spw2015.html#Dong15a
%V 9379
%@ 978-3-319-26095-2
@inproceedings{conf/spw/Dong15a,
added-at = {2023-12-13T07:20:04.000+0100},
author = {Dong, Changyu},
biburl = {https://www.bibsonomy.org/bibtex/279ebd9d3356df3bf2dbbde280e6ad260/admin},
booktitle = {Security Protocols Workshop},
crossref = {conf/spw/2015},
editor = {Christianson, Bruce and Svenda, Petr and Matyás, Vashek and Malcolm, James A. and Stajano, Frank and Anderson, Jonathan},
ee = {https://doi.org/10.1007/978-3-319-26096-9_36},
interhash = {b7c1734ff2d15d72ea47a6a68d61d002},
intrahash = {79ebd9d3356df3bf2dbbde280e6ad260},
isbn = {978-3-319-26095-2},
keywords = {},
pages = {361-363},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2023-12-13T07:20:04.000+0100},
title = {Efficient Data Intensive Secure Computations: Fictional or Real? (Transcript of Discussion).},
url = {http://dblp.uni-trier.de/db/conf/spw/spw2015.html#Dong15a},
volume = 9379,
year = 2015
}