000 | 02959nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-642-28914-9 | ||
003 | DE-He213 | ||
005 | 20240730202032.0 | ||
007 | cr nn 008mamaa | ||
008 | 120305s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642289149 _9978-3-642-28914-9 |
||
024 | 7 |
_a10.1007/978-3-642-28914-9 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aTheory of Cryptography _h[electronic resource] : _b9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings / _cedited by Ronald Cramer. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_a672 p. 6 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7194 |
|
520 | _aThis book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Communication Networks. _9169799 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aCoding and Information Theory. _9169800 |
650 | 2 | 4 |
_aMathematical Applications in Computer Science. _931683 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
700 | 1 |
_aCramer, Ronald. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9169801 |
|
710 | 2 |
_aSpringerLink (Online service) _9169802 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642289132 |
776 | 0 | 8 |
_iPrinted edition: _z9783642289156 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7194 _9169803 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-28914-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96837 _d96837 |