Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I
Gespeichert in:
Format: | Elektronisch Tagungsbericht E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2015
|
Schriftenreihe: | Lecture Notes in Computer Science
9014 |
Schlagworte: | |
Online-Zugang: | Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XX, 660 p.) Ill. |
ISBN: | 9783662464946 9783662464939 |
ISSN: | 0302-9743 |
DOI: | 10.1007/978-3-662-46494-6 |
Internformat
MARC
LEADER | 00000nam a2200000zcb4500 | ||
---|---|---|---|
001 | BV042482190 | ||
003 | DE-604 | ||
005 | 20150716 | ||
007 | cr|uuu---uuuuu | ||
008 | 150402s2015 xx a||| o|||| 10||| eng d | ||
020 | |a 9783662464946 |c Online |9 978-3-662-46494-6 | ||
020 | |a 9783662464939 |c Print |9 978-3-662-46493-9 | ||
024 | 7 | |a 10.1007/978-3-662-46494-6 |2 doi | |
035 | |a (OCoLC)906187232 | ||
035 | |a (DE-599)BVBBV042482190 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-19 |a DE-384 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-706 |a DE-20 |a DE-739 |a DE-92 |a DE-29 |a DE-634 |a DE-860 |a DE-861 |a DE-355 | ||
082 | 0 | |a 004 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 000 |2 stub | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Theory of Cryptography |b 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I |c edited by Yevgeniy Dodis, Jesper Buus Nielsen |
264 | 1 | |a Berlin, Heidelberg |b Springer Berlin Heidelberg |c 2015 | |
300 | |a 1 Online-Ressource (XX, 660 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Lecture Notes in Computer Science |v 9014 |x 0302-9743 | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2015 |z Warschau |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Dodis, Yevgeniy |e Sonstige |0 (DE-588)1068899956 |4 oth | |
711 | 2 | |a Theory of Cryptography Conference |n 12. |d 2015 |c Warschau |j Sonstige |0 (DE-588)1068898666 |4 oth | |
830 | 0 | |a Lecture Notes in Computer Science |v 9014 |w (DE-604)BV014880109 |9 9014 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-662-46494-6 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027917149&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027917149&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-LNC | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
940 | 1 | |q ZDB-2-LNC_2015 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-027917149 |
Datensatz im Suchindex
_version_ | 1820875658841030656 |
---|---|
adam_text |
THEORY OF CRYPTOGRAPHY
/ DODIS, YEVGENIY
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FOUNDATIONS
SYMMETRIC KEY
MULTIPARTY COMPUTATION
CONCURRENT AND RESETTABLE SECURITY
NON-MALLEABLE CODES AND TAMPERING
PRIVACY AMPLIFICATION
ENCRYPTION AND KEY EXCHANGE
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
THEORY OF CRYPTOGRAPHY
/ DODIS, YEVGENIY
: 2015
ABSTRACT / INHALTSTEXT
THE TWO-VOLUME SET LNCS 9014 AND LNCS 9015 CONSTITUTES THE REFEREED
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON THEORY OF
CRYPTOGRAPHY, TCC 2015, HELD IN WARSAW, POLAND IN MARCH 2015. THE 52
REVISED FULL PAPERS PRESENTED WERE CAREFULLY REVIEWED AND SELECTED FROM
137 SUBMISSIONS. THE PAPERS ARE ORGANIZED IN TOPICAL SECTIONS ON
FOUNDATIONS, SYMMETRIC KEY, MULTIPARTY COMPUTATION, CONCURRENT AND
RESETTABLE SECURITY, NON-MALLEABLE CODES AND TAMPERING, PRIVACY
AMPLIFICATION, ENCRYPTION AN KEY EXCHANGE, PSEUDORANDOM FUNCTIONS AND
APPLICATIONS, PROOFS AND VERIFIABLE COMPUTATION, DIFFERENTIAL PRIVACY,
FUNCTIONAL ENCRYPTION, OBFUSCATION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT. |
any_adam_object | 1 |
author_GND | (DE-588)1068899956 |
building | Verbundindex |
bvnumber | BV042482190 |
classification_rvk | ST 276 ST 277 |
classification_tum | DAT 000 DAT 465f |
collection | ZDB-2-SCS ZDB-2-LNC |
ctrlnum | (OCoLC)906187232 (DE-599)BVBBV042482190 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-662-46494-6 |
format | Electronic Conference Proceeding eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zcb4500</leader><controlfield tag="001">BV042482190</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150716</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150402s2015 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662464946</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-46494-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662464939</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-46493-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-46494-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)906187232</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042482190</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory of Cryptography</subfield><subfield code="b">12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I</subfield><subfield code="c">edited by Yevgeniy Dodis, Jesper Buus Nielsen</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer Berlin Heidelberg</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XX, 660 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9014</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2015</subfield><subfield code="z">Warschau</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dodis, Yevgeniy</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1068899956</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Theory of Cryptography Conference</subfield><subfield code="n">12.</subfield><subfield code="d">2015</subfield><subfield code="c">Warschau</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)1068898666</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9014</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9014</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-46494-6</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027917149&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027917149&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2015</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027917149</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2015 Warschau gnd-content |
genre_facet | Konferenzschrift 2015 Warschau |
id | DE-604.BV042482190 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:19:08Z |
institution | BVB |
institution_GND | (DE-588)1068898666 |
isbn | 9783662464946 9783662464939 |
issn | 0302-9743 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027917149 |
oclc_num | 906187232 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-384 DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-706 DE-20 DE-739 DE-92 DE-29 DE-634 DE-860 DE-861 DE-355 DE-BY-UBR |
physical | 1 Online-Ressource (XX, 660 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-LNC ZDB-2-SCS_2015 ZDB-2-LNC_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer Berlin Heidelberg |
record_format | marc |
series | Lecture Notes in Computer Science |
series2 | Lecture Notes in Computer Science |
spelling | Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I edited by Yevgeniy Dodis, Jesper Buus Nielsen Berlin, Heidelberg Springer Berlin Heidelberg 2015 1 Online-Ressource (XX, 660 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Lecture Notes in Computer Science 9014 0302-9743 Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2015 Warschau gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Dodis, Yevgeniy Sonstige (DE-588)1068899956 oth Theory of Cryptography Conference 12. 2015 Warschau Sonstige (DE-588)1068898666 oth Lecture Notes in Computer Science 9014 (DE-604)BV014880109 9014 https://doi.org/10.1007/978-3-662-46494-6 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027917149&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027917149&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I Lecture Notes in Computer Science Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)1071861417 |
title | Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I |
title_auth | Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I |
title_exact_search | Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I |
title_full | Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I edited by Yevgeniy Dodis, Jesper Buus Nielsen |
title_fullStr | Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I edited by Yevgeniy Dodis, Jesper Buus Nielsen |
title_full_unstemmed | Theory of Cryptography 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I edited by Yevgeniy Dodis, Jesper Buus Nielsen |
title_short | Theory of Cryptography |
title_sort | theory of cryptography 12th theory of cryptography conference tcc 2015 warsaw poland march 23 25 2015 proceedings part i |
title_sub | 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie Konferenzschrift 2015 Warschau |
url | https://doi.org/10.1007/978-3-662-46494-6 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027917149&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027917149&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV014880109 |
work_keys_str_mv | AT dodisyevgeniy theoryofcryptography12ththeoryofcryptographyconferencetcc2015warsawpolandmarch23252015proceedingsparti AT theoryofcryptographyconferencewarschau theoryofcryptography12ththeoryofcryptographyconferencetcc2015warsawpolandmarch23252015proceedingsparti |