Theory of cryptography : 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings / Ronald Cramer (ed.).
Material type:
TextSeries: Lecture notes in computer science ; 7194. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resource (xiv, 656 pages)Content type: - text
- computer
- online resource
- 9783642289149
- 3642289142
- 3642289134
- 9783642289132
- TCC 2012
- Data encryption (Computer science) -- Congresses
- Chiffrement (Informatique) -- Congrès
- Informatique
- Data encryption (Computer science)
- Computer science
- Computer Communication Networks
- Data protection
- Data encryption (Computer science)
- Coding theory
- Computer software
- Systems and Data Security
- Coding and Information Theory
- Math Applications in Computer Science
- Algorithm Analysis and Problem Complexity
- algoritmen
- algorithms
- computeranalyse
- computer analysis
- wiskunde
- mathematics
- computerwetenschappen
- computer sciences
- computernetwerken
- computer networks
- gegevensbeheer
- data management
- informatietheorie
- information theory
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8/2 23
- QA76.9.A25 T44 2012
- 54.62
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and author index.
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.