| 000 | 04358cam a2200949 a 4500 | ||
|---|---|---|---|
| 001 | ocn780068537 | ||
| 003 | OCoLC | ||
| 005 | 20250703161505.0 | ||
| 006 | m o d | ||
| 007 | cr cnu---unuuu | ||
| 008 | 120314s2012 gw ob 101 0 eng d | ||
| 040 |
_aGW5XE _beng _epn _cGW5XE _dUKMGB _dCOO _dOCLCQ _dVLB _dE7B _dOCLCA _dOCLCF _dBEDGE _dNLGGC _dOCLCO _dYDXCP _dOCLCA _dOCL _dOCLCO _dOCLCQ _dEBLCP _dOCLCQ _dVGM _dESU _dOCLCQ _dVT2 _dIOG _dNJR _dCEF _dU3W _dWYU _dYOU _dLEAUB _dOCLCQ _dWURST _dLUN _dAJS _dOCLCQ _dUKAHL _dOCLCQ _dOCLCO _dOCLCQ _dOCLCO _dOCLCL _dOCLCQ |
||
| 016 | 7 |
_a016061359 _2Uk |
|
| 019 |
_a785713601 _a910755768 _a1154967412 |
||
| 020 |
_a9783642289149 _q(electronic bk.) |
||
| 020 |
_a3642289142 _q(electronic bk.) |
||
| 020 | _a3642289134 | ||
| 020 | _a9783642289132 | ||
| 020 | _z9783642289132 | ||
| 024 | 7 |
_a10.1007/978-3-642-28914-9 _2doi |
|
| 029 | 1 |
_aNLGGC _b341384453 |
|
| 029 | 1 |
_aNZ1 _b14534553 |
|
| 035 |
_a(OCoLC)780068537 _z(OCoLC)785713601 _z(OCoLC)910755768 _z(OCoLC)1154967412 |
||
| 050 | 4 |
_aQA76.9.A25 _bT44 2012 |
|
| 082 | 0 | 4 |
_a005.8/2 _223 |
| 084 |
_a54.62 _2bcl |
||
| 049 | _aMAIN | ||
| 111 | 2 |
_aTheory of Cryptography Conference _n(9th : _d2012 : _cTaormina, Italy) _944940 |
|
| 245 | 1 | 0 |
_aTheory of cryptography : _b9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings / _cRonald Cramer (ed.). |
| 246 | 3 | _aTCC 2012 | |
| 260 |
_aBerlin ; _aNew York : _bSpringer, _c©2012. |
||
| 300 | _a1 online resource (xiv, 656 pages) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 490 | 1 |
_aLecture notes in computer science, _x0302-9743 ; _v7194 |
|
| 490 | 1 | _aLNCS sublibrary. SL 4, Security and cryptology | |
| 504 | _aIncludes bibliographical references and author index. | ||
| 520 | _aThis book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge. | ||
| 650 | 0 |
_aData encryption (Computer science) _vCongresses. _915030 |
|
| 650 | 6 |
_aChiffrement (Informatique) _vCongrès. _916510 |
|
| 650 | 7 |
_aInformatique. _2eclas _914930 |
|
| 650 | 7 |
_aData encryption (Computer science) _2fast _913647 |
|
| 653 | 4 | _aComputer science. | |
| 653 | 4 | _aComputer Communication Networks. | |
| 653 | 4 | _aData protection. | |
| 653 | 4 | _aData encryption (Computer science) | |
| 653 | 4 | _aCoding theory. | |
| 653 | 4 | _aComputer software. | |
| 653 | 4 | _aSystems and Data Security. | |
| 653 | 4 | _aCoding and Information Theory. | |
| 653 | 4 | _aMath Applications in Computer Science. | |
| 653 | 4 | _aAlgorithm Analysis and Problem Complexity. | |
| 653 | 0 | 0 | _aalgoritmen |
| 653 | 0 | 0 | _aalgorithms |
| 653 | 0 | 0 | _acomputeranalyse |
| 653 | 0 | 0 | _acomputer analysis |
| 653 | 0 | 0 | _awiskunde |
| 653 | 0 | 0 | _amathematics |
| 653 | 0 | 0 | _acomputerwetenschappen |
| 653 | 0 | 0 | _acomputer sciences |
| 653 | 0 | 0 | _acomputernetwerken |
| 653 | 0 | 0 | _acomputer networks |
| 653 | 0 | 0 | _agegevensbeheer |
| 653 | 0 | 0 | _adata management |
| 653 | 0 | 0 | _ainformatietheorie |
| 653 | 0 | 0 | _ainformation theory |
| 653 | 1 | 0 | _aInformation and Communication Technology (General) |
| 653 | 1 | 0 | _aInformatie- en communicatietechnologie (algemeen) |
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 655 | 7 |
_aSoftware. _2lcgft _998343 |
|
| 700 | 1 |
_aCramer, Ronald, _d1968- _1https://id.oclc.org/worldcat/entity/E39PBJvxq7xmXHqrfhrymHFBT3 |
|
| 776 | 0 | 8 |
_iPrinted edition: _z9783642289132 |
| 830 | 0 |
_aLecture notes in computer science ; _v7194. |
|
| 830 | 0 |
_aLNCS sublibrary. _nSL 4, _pSecurity and cryptology. _920708 |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/978-3-642-28914-9 |
| 938 |
_aAskews and Holts Library Services _bASKH _nAH29630964 |
||
| 938 |
_aProQuest Ebook Central _bEBLB _nEBL3070257 |
||
| 938 |
_aebrary _bEBRY _nebr10651813 |
||
| 938 |
_aYBP Library Services _bYANK _n7573045 |
||
| 994 |
_a92 _bATIST |
||
| 999 |
_c641700 _d641700 |
||