APA (7th ed.) Citation

Järvinen, K., Kolesnikov, V., Sadeghi, A., & Schneider, T. (2010). Efficient Secure Two-Party Computation with Untrusted Hardware Tokens. Towards Hardware-Intrinsic Security, 367-386. https://doi.org/10.1007/978-3-642-14452-3_17

Chicago Style (17th ed.) Citation

Järvinen, Kimmo, Vladimir Kolesnikov, Ahmad-Reza Sadeghi, and Thomas Schneider. "Efficient Secure Two-Party Computation with Untrusted Hardware Tokens." Towards Hardware-Intrinsic Security 2010: 367-386. https://doi.org/10.1007/978-3-642-14452-3_17.

MLA (9th ed.) Citation

Järvinen, Kimmo, et al. "Efficient Secure Two-Party Computation with Untrusted Hardware Tokens." Towards Hardware-Intrinsic Security, 2010, pp. 367-386, https://doi.org/10.1007/978-3-642-14452-3_17.

Warning: These citations may not always be 100% accurate.