Homomorphic Encryption and Applications:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2014
|
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | TUM01 UPA01 UBR01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | XII, 126 p. Ill. |
ISBN: | 9783319122298 9783319122281 |
DOI: | 10.1007/978-3-319-12229-8 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV042249257 | ||
003 | DE-604 | ||
005 | 20161208 | ||
007 | cr|uuu---uuuuu | ||
008 | 141219s2014 |||| o||u| ||||||eng d | ||
020 | |a 9783319122298 |c Online |9 978-3-319-12229-8 | ||
020 | |a 9783319122281 |c Print |9 978-3-319-12228-1 | ||
024 | 7 | |a 10.1007/978-3-319-12229-8 |2 doi | |
035 | |a (OCoLC)897560711 | ||
035 | |a (DE-599)BVBBV042249257 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-703 |a DE-20 |a DE-92 |a DE-859 |a DE-M347 |a DE-473 |a DE-522 |a DE-29 |a DE-861 |a DE-Aug4 |a DE-634 |a DE-91 |a DE-739 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 530 |0 (DE-625)143679: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Yi, Xun |e Verfasser |4 aut | |
245 | 1 | 0 | |a Homomorphic Encryption and Applications |c by Xun Yi, Russell Paulet, Elisa Bertino |
264 | 1 | |a Cham |b Springer International Publishing |c 2014 | |
300 | |a XII, 126 p. |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science | |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 1 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Paulet, Russell |e Sonstige |4 oth | |
700 | 1 | |a Bertino, Elisa |d 1957- |e Sonstige |0 (DE-588)1018830286 |4 oth | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-12229-8 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027687265&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027687265&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS |a ZDB-26-MYL | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027687265 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=1967023 |l TUM01 |p ZDB-26-MYL |q TUM_PDA_MIL_Kauf |x Aggregator |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12229-8 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-12229-8 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152794697957376 |
---|---|
adam_text | HOMOMORPHIC ENCRYPTION AND APPLICATIONS
/ YI, XUN
: 2014
TABLE OF CONTENTS / INHALTSVERZEICHNIS
INTRODUCTION
HOMOMORPHIC ENCRYPTION
FULLY HOMOMORPHIC ENCRYPTION
REMOTE END-TO-END VOTING SCHEME
NEAREST NEIGHBOR QUERIES WITH LOCATION PRIVACY
PRIVATE SEARCHING ON STREAMING DATA
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
HOMOMORPHIC ENCRYPTION AND APPLICATIONS
/ YI, XUN
: 2014
ABSTRACT / INHALTSTEXT
THIS BOOK INTRODUCES THE FUNDAMENTAL CONCEPTS OF HOMOMORPHIC ENCRYPTION.
FROM THESE FOUNDATIONS, APPLICATIONS ARE DEVELOPED IN THE FIELDS OF
PRIVATE INFORMATION RETRIEVAL, PRIVATE SEARCHING ON STREAMING DATA,
PRIVACY-PRESERVING DATA MINING, ELECTRONIC VOTING AND CLOUD COMPUTING.
THE CONTENT IS PRESENTED IN AN INSTRUCTIONAL AND PRACTICAL STYLE, WITH
CONCRETE EXAMPLES TO ENHANCE THE READER S UNDERSTANDING. THIS VOLUME
ACHIEVES A BALANCE BETWEEN THE THEORETICAL AND THE PRACTICAL COMPONENTS
OF MODERN INFORMATION SECURITY. READERS WILL LEARN KEY PRINCIPLES OF
HOMOMORPHIC ENCRYPTION AS WELL AS THEIR APPLICATION IN SOLVING REAL
WORLD PROBLEMS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Yi, Xun |
author_GND | (DE-588)1018830286 |
author_facet | Yi, Xun |
author_role | aut |
author_sort | Yi, Xun |
author_variant | x y xy |
building | Verbundindex |
bvnumber | BV042249257 |
classification_rvk | ST 276 ST 530 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-26-MYL |
ctrlnum | (OCoLC)897560711 (DE-599)BVBBV042249257 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-12229-8 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02514nmm a2200505 c 4500</leader><controlfield tag="001">BV042249257</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161208 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">141219s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319122298</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-12229-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319122281</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-319-12228-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-12229-8</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)897560711</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042249257</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-703</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-522</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 530</subfield><subfield code="0">(DE-625)143679:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Yi, Xun</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Homomorphic Encryption and Applications</subfield><subfield code="c">by Xun Yi, Russell Paulet, Elisa Bertino</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 126 p.</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Paulet, Russell</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bertino, Elisa</subfield><subfield code="d">1957-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1018830286</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-12229-8</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027687265&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027687265&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-26-MYL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027687265</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/munchentech/detail.action?docID=1967023</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-26-MYL</subfield><subfield code="q">TUM_PDA_MIL_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12229-8</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-12229-8</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042249257 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:16:23Z |
institution | BVB |
isbn | 9783319122298 9783319122281 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027687265 |
oclc_num | 897560711 |
open_access_boolean | |
owner | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-29 DE-861 DE-Aug4 DE-634 DE-91 DE-BY-TUM DE-739 DE-355 DE-BY-UBR |
owner_facet | DE-703 DE-20 DE-92 DE-859 DE-M347 DE-473 DE-BY-UBG DE-522 DE-29 DE-861 DE-Aug4 DE-634 DE-91 DE-BY-TUM DE-739 DE-355 DE-BY-UBR |
physical | XII, 126 p. Ill. |
psigel | ZDB-2-SCS ZDB-26-MYL ZDB-26-MYL TUM_PDA_MIL_Kauf |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Springer International Publishing |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spelling | Yi, Xun Verfasser aut Homomorphic Encryption and Applications by Xun Yi, Russell Paulet, Elisa Bertino Cham Springer International Publishing 2014 XII, 126 p. Ill. txt rdacontent c rdamedia cr rdacarrier SpringerBriefs in Computer Science Data Mining (DE-588)4428654-5 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Chiffrierung (DE-588)4352893-4 s Data Mining (DE-588)4428654-5 s DE-604 Paulet, Russell Sonstige oth Bertino, Elisa 1957- Sonstige (DE-588)1018830286 oth https://doi.org/10.1007/978-3-319-12229-8 Verlag URL des Erstveröffentlichers Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027687265&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027687265&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Yi, Xun Homomorphic Encryption and Applications Data Mining (DE-588)4428654-5 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4428654-5 (DE-588)4352893-4 |
title | Homomorphic Encryption and Applications |
title_auth | Homomorphic Encryption and Applications |
title_exact_search | Homomorphic Encryption and Applications |
title_full | Homomorphic Encryption and Applications by Xun Yi, Russell Paulet, Elisa Bertino |
title_fullStr | Homomorphic Encryption and Applications by Xun Yi, Russell Paulet, Elisa Bertino |
title_full_unstemmed | Homomorphic Encryption and Applications by Xun Yi, Russell Paulet, Elisa Bertino |
title_short | Homomorphic Encryption and Applications |
title_sort | homomorphic encryption and applications |
topic | Data Mining (DE-588)4428654-5 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Data Mining Chiffrierung |
url | https://doi.org/10.1007/978-3-319-12229-8 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027687265&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027687265&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT yixun homomorphicencryptionandapplications AT pauletrussell homomorphicencryptionandapplications AT bertinoelisa homomorphicencryptionandapplications |