Theory of cryptography : 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings /

This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sectio...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Cramer, Ronald
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2012.
Series:Lecture Notes in Computer Science 7194
Subjects:
Online Access:Click here to view the full text content
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 02188nam a2200421 i 4500
001 vtls000105529
003 MY-ArUMP
005 20210731152133.0
006 m fo d
007 cr nn 008mamaa
008 121130s2012 gw | fs |||| 0|eng d
020 |a 9783642289149 
039 9 |a 201308271531  |b SMI  |c 201211302141  |d NY  |y 201211141225  |z SMR 
040 |a MYPMP  |b eng  |c MYPMP  |e rda 
245 1 0 |a Theory of cryptography :  |b 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings /  |c edited by Ronald Cramer. 
264 1 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2012. 
300 |a 1 online resource (670 pages)  |b digital. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Lecture Notes in Computer Science  |x 0302-9743  |v 7194 
520 |a This book constitutes the thoroughly refereed proceedings of the 9th Theory of Cryptography Conference, TCC 2012, held in Taormina, Sicily, Italy, in March 2012. The 36 revised full papers presented were carefully reviewed and selected from 131 submissions. The papers are organized in topical sections on secure computation; (blind) signatures and threshold encryption; zero-knowledge and security models; leakage-resilience; hash functions; differential privacy; pseudorandomness; dedicated encryption; security amplification; resettable and parallel zero knowledge. 
650 0 |a Computer science. 
650 0 |a Computer Communication Networks. 
650 0 |a Data protection. 
650 0 |a Data encryption (Computer science). 
650 0 |a Coding theory. 
650 0 |a Computer software. 
700 1 |a Cramer, Ronald. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642289132 
830 0 |a Lecture Notes in Computer Science  |x 0302-9743  |v 7194 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-28914-9  |y Click here to view the full text content 
942 |2 lcc  |c BK-EBOOK 
949 |a VIRTUAITEM  |d 10011  |f 1  |x 9 
999 |c 49145  |d 49145 
952 |0 0  |1 0  |2 lcc  |4 0  |7 0  |9 44780  |a FSGM  |b FSGM  |d 2021-07-31  |l 0  |r 2021-07-31  |t 1  |w 2021-07-31  |y BK-EBOOK