APA-Zitierstil (7. Ausg.)
Thomas Schneider. (2012). Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer.
Chicago-Zitierstil (17. Ausg.)
Thomas Schneider. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Berlín, Alemania: Springer, 2012.
MLA-Zitierstil (9. Ausg.)
Thomas Schneider. Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation. Springer, 2012.
Achtung: Diese Zitate sind unter Umständen nicht zu 100% korrekt.