000 03082nam a22005175i 4500
999 _c200434196
_d52408
003 DE-He213
005 20231104114325.0
007 cr nn 008mamaa
008 150309s2015 gw | s |||| 0|eng d
020 _a9783662464977
_z978-3-662-46497-7
024 7 _a10.1007/978-3-662-46497-7
_2doi
040 _aTR-AnTOB
_beng
_cTR-AnTOB
_erda
050 4 _aQA76.9.D335
072 7 _aGPJ
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema005.82
_223
245 1 0 _aTheory of Cryptography :
_b12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II /
_cedited by Yevgeniy Dodis, Jesper Buus Nielsen.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2015.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aSecurity and Cryptology ;
_v9015
505 0 _aPseudorandom Functions and Applications -- Proofs and Verifiable Computation -- Differential Privacy -- Functional Encryption -- Obfuscation.
520 _aThe two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.
650 0 _aData encryption (Computer science).
650 0 _aComputer security.
650 0 _aComputer science.
650 0 _aComputer software.
650 0 _aComputational complexity.
650 1 4 _aCryptology.
_0http://scigraph.springernature.com/things/product-market-codes/I28020
650 2 4 _aSystems and Data Security.
_0http://scigraph.springernature.com/things/product-market-codes/I28060
650 2 4 _aComputation by Abstract Devices.
_0http://scigraph.springernature.com/things/product-market-codes/I16013
650 2 4 _aAlgorithm Analysis and Problem Complexity.
_0http://scigraph.springernature.com/things/product-market-codes/I16021
650 2 4 _aDiscrete Mathematics in Computer Science.
_0http://scigraph.springernature.com/things/product-market-codes/I17028
700 1 _aDodis, Yevgeniy.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aNielsen, Jesper Buus.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
856 4 0 _uhttps://doi.org/10.1007/978-3-662-46497-7
_3Springer eBooks
_zOnline access link to the resource
942 _2lcc
_cEBK
041 _aeng