Theory of cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, the Netherlands, February 21-24, 2007 : proceedings / Salil P. Vadhan (ed.).
Material type:
TextSeries: Lecture notes in computer science ; 4392.Publication details: Berlin ; New York : Springer, ©2007.Description: 1 online resource (xi, 594 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783540709367
- 3540709363
- 3540709355
- 9783540709350
- 9786610902194
- 6610902194
- TCC 2007
- 4th Theory of Cryptography Conference
- Fourth Theory of Cryptography Conference
- Computer security -- Congresses
- Cryptography -- Congresses
- Sécurité informatique -- Congrès
- Cryptographie -- Congrès
- Cryptography
- Computer security
- Informatique
- Computer security
- Cryptography
- algoritmen
- algorithms
- computeranalyse
- computer analysis
- computers
- samenleving
- society
- wiskunde
- mathematics
- informatiesystemen
- information systems
- computerwetenschappen
- computer sciences
- gegevensbeheer
- data management
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8 22
- QA76.9.A25 T473 2007eb
- TP309-532
- SS 4800
- 004
- DAT 465f
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Encryption -- Universally composable security -- Arguments and zero knowledge -- Notions of security -- Obfuscation -- Secret sharing and multiparty computation -- Signatures and water marking -- Private approximation and black-box reductions -- Key establishment.
Includes bibliographical references and index.
Print version record.
This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers presented were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment.
University staff and students only. Requires University Computer Account login off-campus.