Theory of cryptography: 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Tagungsbericht E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schriftenreihe: | Lecture notes in computer science
7785 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XI, 724 S.) graph. Darst. |
ISBN: | 9783642365935 9783642365942 |
DOI: | 10.1007/978-3-642-36594-2 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV040918187 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 130328s2013 gw d||| o|||| 10||| eng d | ||
020 | |a 9783642365935 |9 978-3-642-36593-5 | ||
020 | |a 9783642365942 |c Online |9 978-3-642-36594-2 | ||
024 | 7 | |a 10.1007/978-3-642-36594-2 |2 doi | |
035 | |a (OCoLC)839974325 | ||
035 | |a (DE-599)BVBBV040918187 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-473 |a DE-20 |a DE-91 |a DE-706 |a DE-739 |a DE-384 |a DE-M347 |a DE-703 |a DE-29 |a DE-92 |a DE-Aug4 |a DE-859 |a DE-634 |a DE-355 | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Theory of cryptography |b 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |c Amit Sahai ... (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a 1 Online-Ressource (XI, 724 S.) |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7785 | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2013 |z Tokio |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sahai, Amit |4 edt | |
711 | 2 | |a Theory of Cryptography Conference |n 10 |d 2013 |c Tokio |j Sonstige |0 (DE-588)1032138696 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 7785 |w (DE-604)BV014880109 |9 7785 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-36594-2 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025897389&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025897389&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-LNC | ||
912 | |a ZDB-2-SCS | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-025897389 |
Datensatz im Suchindex
_version_ | 1820875452819963904 |
---|---|
adam_text |
THEORY OF CRYPTOGRAPHY
/
: 2013
TABLE OF CONTENTS / INHALTSVERZEICHNIS
STUDY OF KNOWN PARADIGMS
APPROACHES, AND TECHNIQUES, DIRECTED TOWARDS THEIR BETTER UNDERSTANDING
AND UTILIZATION
DISCOVERY OF NEW PARADIGMS, APPROACHES AND TECHNIQUES THAT OVERCOME
LIMITATIONS OF THE EXISTING ONES
FORMULATION AND TREATMENT OF NEW CRYPTOGRAPHIC PROBLEMS
STUDY OF NOTIONS OF SECURITY AND RELATIONS AMONG THEM
MODELING AND ANALYSIS OF CRYPTOGRAPHIC ALGORITHMS
STUDY OF THE COMPLEXITY ASSUMPTIONS USED IN CRYPTOGRAPHY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
THEORY OF CRYPTOGRAPHY
/
: 2013
ABSTRACT / INHALTSTEXT
THIS BOOK CONSTITUTES THE THOROUGHLY REFEREED PROCEEDINGS OF THE 10TH
THEORY OF CRYPTOGRAPHY CONFERENCE, TCC 2013, HELD IN TOKYO, JAPAN, IN
MARCH 2013. THE 36 REVISED FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED
AND SELECTED FROM 98 SUBMISSIONS. THE PAPERS COVER TOPICS SUCH AS STUDY
OF KNOWN PARADIGMS, APPROACHES, AND TECHNIQUES, DIRECTED TOWARDS THEIR
BETTER UNDERSTANDING AND UTILIZATION; DISCOVERY OF NEW PARADIGMS,
APPROACHES AND TECHNIQUES THAT OVERCOME LIMITATIONS OF THE EXISTING
ONES; FORMULATION AND TREATMENT OF NEW CRYPTOGRAPHIC PROBLEMS; STUDY OF
NOTIONS OF SECURITY AND RELATIONS AMONG THEM; MODELING AND ANALYSIS OF
CRYPTOGRAPHIC ALGORITHMS; AND STUDY OF THE COMPLEXITY ASSUMPTIONS USED
IN CRYPTOGRAPHY
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author2 | Sahai, Amit |
author2_role | edt |
author2_variant | a s as |
author_facet | Sahai, Amit |
building | Verbundindex |
bvnumber | BV040918187 |
classification_rvk | SS 4800 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-LNC ZDB-2-SCS |
ctrlnum | (OCoLC)839974325 (DE-599)BVBBV040918187 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-642-36594-2 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV040918187</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">130328s2013 gw d||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642365935</subfield><subfield code="9">978-3-642-36593-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642365942</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-642-36594-2</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-642-36594-2</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)839974325</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040918187</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory of cryptography</subfield><subfield code="b">10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings</subfield><subfield code="c">Amit Sahai ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XI, 724 S.)</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7785</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2013</subfield><subfield code="z">Tokio</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sahai, Amit</subfield><subfield code="4">edt</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Theory of Cryptography Conference</subfield><subfield code="n">10</subfield><subfield code="d">2013</subfield><subfield code="c">Tokio</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1032138696</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7785</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">7785</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-642-36594-2</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025897389&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025897389&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025897389</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2013 Tokio gnd-content |
genre_facet | Konferenzschrift 2013 Tokio |
id | DE-604.BV040918187 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:15:52Z |
institution | BVB |
institution_GND | (DE-588)1032138696 |
isbn | 9783642365935 9783642365942 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025897389 |
oclc_num | 839974325 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-Aug4 DE-859 DE-634 DE-355 DE-BY-UBR |
owner_facet | DE-473 DE-BY-UBG DE-20 DE-91 DE-BY-TUM DE-706 DE-739 DE-384 DE-M347 DE-703 DE-29 DE-92 DE-Aug4 DE-859 DE-634 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XI, 724 S.) graph. Darst. |
psigel | ZDB-2-LNC ZDB-2-SCS |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Amit Sahai ... (ed.) Berlin [u.a.] Springer 2013 1 Online-Ressource (XI, 724 S.) graph. Darst. txt rdacontent c rdamedia cr rdacarrier Lecture notes in computer science 7785 Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2013 Tokio gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Sahai, Amit edt Theory of Cryptography Conference 10 2013 Tokio Sonstige (DE-588)1032138696 oth Lecture notes in computer science 7785 (DE-604)BV014880109 7785 https://doi.org/10.1007/978-3-642-36594-2 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025897389&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025897389&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Lecture notes in computer science Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)1071861417 |
title | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |
title_auth | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |
title_exact_search | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |
title_full | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Amit Sahai ... (ed.) |
title_fullStr | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Amit Sahai ... (ed.) |
title_full_unstemmed | Theory of cryptography 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings Amit Sahai ... (ed.) |
title_short | Theory of cryptography |
title_sort | theory of cryptography 10th theory of cryptography conference tcc 2013 tokyo japan march 3 6 2013 proceedings |
title_sub | 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013 ; proceedings |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie Konferenzschrift 2013 Tokio |
url | https://doi.org/10.1007/978-3-642-36594-2 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025897389&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025897389&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT sahaiamit theoryofcryptography10ththeoryofcryptographyconferencetcc2013tokyojapanmarch362013proceedings AT theoryofcryptographyconferencetokio theoryofcryptography10ththeoryofcryptographyconferencetcc2013tokyojapanmarch362013proceedings |