Processing math: 100%
26
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Cryptology and Network Security: 17th International Conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018, Proceedings 

      Computing Betweenness Centrality: An Efficient Privacy-Preserving Approach

      other
      ,
      Springer International Publishing

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references16

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          How to generate and exchange secrets

          Andrew Yao (1986)
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Betweenness centrality as an indicator of the interdisciplinarity of scientific journals

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              A Proof of Security of Yao’s Protocol for Two-Party Computation

                Bookmark

                Author and book information

                Book Chapter
                2018
                September 01 2018
                : 23-42
                10.1007/978-3-030-00434-7_2
                1c32b6ea-834b-47e1-8b04-fabb4fc0db49
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,588