000 | 02518nam a22005415i 4500 | ||
---|---|---|---|
001 | 978-3-642-28914-9 | ||
003 | DE-He213 | ||
005 | 20140220083314.0 | ||
007 | cr nn 008mamaa | ||
008 | 120305s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642289149 _9978-3-642-28914-9 |
||
024 | 7 |
_a10.1007/978-3-642-28914-9 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.82 _223 |
100 | 1 |
_aCramer, Ronald. _eeditor. |
|
245 | 1 | 0 |
_aTheory of Cryptography _h[electronic resource] : _b9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings / _cedited by Ronald Cramer. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2012. |
|
300 |
_aApprox. 670 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7194 |
|
520 | _aThis book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aComputer software. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aMath Applications in Computer Science. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642289132 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v7194 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-28914-9 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
999 |
_c102917 _d102917 |