Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Theory of cryptography = 12th Theory...
~
Dodis, Yevgeniy.
Linked to FindBook
Google Book
Amazon
博客來
Theory of cryptography = 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.. Part I /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Theory of cryptography/ edited by Yevgeniy Dodis, Jesper Buus Nielsen.
Reminder of title:
12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.
remainder title:
TCC 2015
other author:
Dodis, Yevgeniy.
Published:
Berlin, Heidelberg :Springer Berlin Heidelberg : : 2015.,
Description:
xx, 660 p. :ill., digital ;24 cm.
[NT 15003449]:
Foundations -- Symmetric Key -- Multiparty Computation -- Concurrent and Resettable Security -- Non-malleable Codes and Tampering -- Privacy Amplification -- Encryption and Key Exchange.
Contained By:
Springer eBooks
Subject:
Data encryption (Computer science) -
Online resource:
http://dx.doi.org/10.1007/978-3-662-46494-6
ISBN:
9783662464946 (electronic bk.)
Theory of cryptography = 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.. Part I /
Theory of cryptography
12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.Part I /[electronic resource] :TCC 2015edited by Yevgeniy Dodis, Jesper Buus Nielsen. - Berlin, Heidelberg :Springer Berlin Heidelberg :2015. - xx, 660 p. :ill., digital ;24 cm. - Lecture notes in computer science,90140302-9743 ;. - Lecture notes in computer science ;5353..
Foundations -- Symmetric Key -- Multiparty Computation -- Concurrent and Resettable Security -- Non-malleable Codes and Tampering -- Privacy Amplification -- Encryption and Key Exchange.
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption a key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.
ISBN: 9783662464946 (electronic bk.)
Standard No.: 10.1007/978-3-662-46494-6doiSubjects--Topical Terms:
579162
Data encryption (Computer science)
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.82
Theory of cryptography = 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.. Part I /
LDR
:01970nmm a2200337 a 4500
001
1997854
003
DE-He213
005
20151023133857.0
006
m d
007
cr nn 008maaau
008
151112s2015 gw s 0 eng d
020
$a
9783662464946 (electronic bk.)
020
$a
9783662464939 (paper)
024
7
$a
10.1007/978-3-662-46494-6
$2
doi
035
$a
978-3-662-46494-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
URY
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.A25
$b
T396 2015
245
1 0
$a
Theory of cryptography
$h
[electronic resource] :
$b
12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015 : proceedings.
$n
Part I /
$c
edited by Yevgeniy Dodis, Jesper Buus Nielsen.
246
3
$a
TCC 2015
260
$a
Berlin, Heidelberg :
$b
Springer Berlin Heidelberg :
$b
Imprint: Springer,
$c
2015.
300
$a
xx, 660 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in computer science,
$x
0302-9743 ;
$v
9014
505
0
$a
Foundations -- Symmetric Key -- Multiparty Computation -- Concurrent and Resettable Security -- Non-malleable Codes and Tampering -- Privacy Amplification -- Encryption and Key Exchange.
520
$a
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption a key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.
650
0
$a
Data encryption (Computer science)
$3
579162
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Data Encryption.
$3
891254
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Computation by Abstract Devices.
$3
891207
650
2 4
$a
Algorithm Analysis and Problem Complexity.
$3
891007
650
2 4
$a
Discrete Mathematics in Computer Science.
$3
892513
700
1
$a
Dodis, Yevgeniy.
$3
2139210
700
1
$a
Nielsen, Jesper Buus.
$3
2139211
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Lecture notes in computer science ;
$v
5353.
$x
0302-9743
$3
1274248
856
4 0
$u
http://dx.doi.org/10.1007/978-3-662-46494-6
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Location:
全部
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9268565
電子資源
01.外借(書)_YB
電子書
EB QA76.9.A25 T396 2015
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login