Theory of cryptography : 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings /
This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sectio...
Saved in:
| Corporate Author: | |
|---|---|
| Other Authors: | |
| Format: | eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2012.
|
| Series: | Lecture Notes in Computer Science
7194 |
| Subjects: | |
| Online Access: | Click here to view the full text content |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| LEADER | 02188nam a2200421 i 4500 | ||
|---|---|---|---|
| 001 | vtls000105529 | ||
| 003 | MY-ArUMP | ||
| 005 | 20210731152133.0 | ||
| 006 | m fo d | ||
| 007 | cr nn 008mamaa | ||
| 008 | 121130s2012 gw | fs |||| 0|eng d | ||
| 020 | |a 9783642289149 | ||
| 039 | 9 | |a 201308271531 |b SMI |c 201211302141 |d NY |y 201211141225 |z SMR | |
| 040 | |a MYPMP |b eng |c MYPMP |e rda | ||
| 245 | 1 | 0 | |a Theory of cryptography : |b 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings / |c edited by Ronald Cramer. |
| 264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2012. | |
| 300 | |a 1 online resource (670 pages) |b digital. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 490 | 0 | |a Lecture Notes in Computer Science |x 0302-9743 |v 7194 | |
| 520 | |a This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge. | ||
| 650 | 0 | |a Computer science. | |
| 650 | 0 | |a Computer Communication Networks. | |
| 650 | 0 | |a Data protection. | |
| 650 | 0 | |a Data encryption (Computer science). | |
| 650 | 0 | |a Coding theory. | |
| 650 | 0 | |a Computer software. | |
| 700 | 1 | |a Cramer, Ronald. | |
| 710 | 2 | |a SpringerLink (Online service) | |
| 773 | 0 | |t Springer eBooks | |
| 776 | 0 | 8 | |i Printed edition: |z 9783642289132 |
| 830 | 0 | |a Lecture Notes in Computer Science |x 0302-9743 |v 7194 | |
| 856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-642-28914-9 |y Click here to view the full text content |
| 942 | |2 lcc |c BK-EBOOK | ||
| 949 | |a VIRTUAITEM |d 10011 |f 1 |x 9 | ||
| 999 | |c 49145 |d 49145 | ||
| 952 | |0 0 |1 0 |2 lcc |4 0 |7 0 |9 44780 |a FSGM |b FSGM |d 2021-07-31 |l 0 |r 2021-07-31 |t 1 |w 2021-07-31 |y BK-EBOOK | ||