000 04358cam a2200949 a 4500
001 ocn780068537
003 OCoLC
005 20250703161505.0
006 m o d
007 cr cnu---unuuu
008 120314s2012 gw ob 101 0 eng d
040 _aGW5XE
_beng
_epn
_cGW5XE
_dUKMGB
_dCOO
_dOCLCQ
_dVLB
_dE7B
_dOCLCA
_dOCLCF
_dBEDGE
_dNLGGC
_dOCLCO
_dYDXCP
_dOCLCA
_dOCL
_dOCLCO
_dOCLCQ
_dEBLCP
_dOCLCQ
_dVGM
_dESU
_dOCLCQ
_dVT2
_dIOG
_dNJR
_dCEF
_dU3W
_dWYU
_dYOU
_dLEAUB
_dOCLCQ
_dWURST
_dLUN
_dAJS
_dOCLCQ
_dUKAHL
_dOCLCQ
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
_dOCLCQ
016 7 _a016061359
_2Uk
019 _a785713601
_a910755768
_a1154967412
020 _a9783642289149
_q(electronic bk.)
020 _a3642289142
_q(electronic bk.)
020 _a3642289134
020 _a9783642289132
020 _z9783642289132
024 7 _a10.1007/978-3-642-28914-9
_2doi
029 1 _aNLGGC
_b341384453
029 1 _aNZ1
_b14534553
035 _a(OCoLC)780068537
_z(OCoLC)785713601
_z(OCoLC)910755768
_z(OCoLC)1154967412
050 4 _aQA76.9.A25
_bT44 2012
082 0 4 _a005.8/2
_223
084 _a54.62
_2bcl
049 _aMAIN
111 2 _aTheory of Cryptography Conference
_n(9th :
_d2012 :
_cTaormina, Italy)
_944940
245 1 0 _aTheory of cryptography :
_b9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings /
_cRonald Cramer (ed.).
246 3 _aTCC 2012
260 _aBerlin ;
_aNew York :
_bSpringer,
_c©2012.
300 _a1 online resource (xiv, 656 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aLecture notes in computer science,
_x0302-9743 ;
_v7194
490 1 _aLNCS sublibrary. SL 4, Security and cryptology
504 _aIncludes bibliographical references and author index.
520 _aThis book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge.
650 0 _aData encryption (Computer science)
_vCongresses.
_915030
650 6 _aChiffrement (Informatique)
_vCongrès.
_916510
650 7 _aInformatique.
_2eclas
_914930
650 7 _aData encryption (Computer science)
_2fast
_913647
653 4 _aComputer science.
653 4 _aComputer Communication Networks.
653 4 _aData protection.
653 4 _aData encryption (Computer science)
653 4 _aCoding theory.
653 4 _aComputer software.
653 4 _aSystems and Data Security.
653 4 _aCoding and Information Theory.
653 4 _aMath Applications in Computer Science.
653 4 _aAlgorithm Analysis and Problem Complexity.
653 0 0 _aalgoritmen
653 0 0 _aalgorithms
653 0 0 _acomputeranalyse
653 0 0 _acomputer analysis
653 0 0 _awiskunde
653 0 0 _amathematics
653 0 0 _acomputerwetenschappen
653 0 0 _acomputer sciences
653 0 0 _acomputernetwerken
653 0 0 _acomputer networks
653 0 0 _agegevensbeheer
653 0 0 _adata management
653 0 0 _ainformatietheorie
653 0 0 _ainformation theory
653 1 0 _aInformation and Communication Technology (General)
653 1 0 _aInformatie- en communicatietechnologie (algemeen)
655 7 _aConference papers and proceedings
_2fast
_96065
655 7 _aSoftware.
_2lcgft
_998343
700 1 _aCramer, Ronald,
_d1968-
_1https://id.oclc.org/worldcat/entity/E39PBJvxq7xmXHqrfhrymHFBT3
776 0 8 _iPrinted edition:
_z9783642289132
830 0 _aLecture notes in computer science ;
_v7194.
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
_920708
856 4 0 _uhttps://link.springer.com/10.1007/978-3-642-28914-9
938 _aAskews and Holts Library Services
_bASKH
_nAH29630964
938 _aProQuest Ebook Central
_bEBLB
_nEBL3070257
938 _aebrary
_bEBRY
_nebr10651813
938 _aYBP Library Services
_bYANK
_n7573045
994 _a92
_bATIST
999 _c641700
_d641700