[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/series/isc/JarvinenKS010>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Ahmad-Reza_Sadeghi>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Kimmo_J%E2%88%9A%C2%A7rvinen_0001>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Thomas_Schneider_0003>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Vladimir_Kolesnikov>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1007%2F978-3-642-14452-3%5F17>
foaf:homepage <https://doi.org/10.1007/978-3-642-14452-3_17>
dc:identifier DBLP series/isc/JarvinenKS010 (xsd:string)
dc:identifier DOI doi.org%2F10.1007%2F978-3-642-14452-3%5F17 (xsd:string)
dcterms:issued 2010 (xsd:gYear)
rdfs:label Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Ahmad-Reza_Sadeghi>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Kimmo_J%E2%88%9A%C2%A7rvinen_0001>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Thomas_Schneider_0003>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Vladimir_Kolesnikov>
swrc:pages 367-386 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/series/isc/364214451>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/series/isc/JarvinenKS010/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/series/isc/JarvinenKS010>
rdfs:seeAlso <http://dblp.uni-trier.de/db/series/isc/isc364214451.html#JarvinenKS010>
rdfs:seeAlso <https://doi.org/10.1007/978-3-642-14452-3_17>
swrc:series <https://dblp.l3s.de/d2r/resource/collections/isc>
dc:title Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version). (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InCollection
rdf:type foaf:Document