Protecting Privacy through Homomorphic Encryption:
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2021
Cham Springer |
Ausgabe: | 1st ed. 2021 |
Schlagworte: | |
Online-Zugang: | DE-634 DE-1043 DE-1050 DE-92 DE-898 DE-861 DE-863 DE-862 DE-523 DE-91 DE-384 DE-19 DE-703 DE-20 DE-706 DE-824 DE-739 Volltext |
Beschreibung: | 1 Online-Ressource (XVI, 176 p. 35 illus., 28 illus. in color) |
ISBN: | 9783030772871 |
DOI: | 10.1007/978-3-030-77287-1 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV047831868 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 220211s2021 xx o|||| 00||| eng d | ||
020 | |a 9783030772871 |c Online |9 978-3-030-77287-1 | ||
024 | 7 | |a 10.1007/978-3-030-77287-1 |2 doi | |
035 | |a (ZDB-2-SMA)9783030772871 | ||
035 | |a (OCoLC)1298741009 | ||
035 | |a (DE-599)BVBBV047831868 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-384 |a DE-91 |a DE-19 |a DE-1043 |a DE-898 |a DE-861 |a DE-188 |a DE-523 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-92 |a DE-824 |a DE-703 |a DE-706 |a DE-739 |a DE-634 | ||
082 | 0 | |a 004.0151 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a MAT 000 |2 stub | ||
245 | 1 | 0 | |a Protecting Privacy through Homomorphic Encryption |c edited by Kristin Lauter, Wei Dai, Kim Laine |
250 | |a 1st ed. 2021 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2021 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (XVI, 176 p. 35 illus., 28 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 4 | |a Mathematical Applications in Computer Science | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Number Theory | |
650 | 4 | |a Algebraic Geometry | |
650 | 4 | |a Privacy | |
650 | 4 | |a Security Science and Technology | |
650 | 4 | |a Computer science—Mathematics | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Number theory | |
650 | 4 | |a Algebraic geometry | |
650 | 4 | |a Data protection—Law and legislation | |
650 | 4 | |a Security systems | |
700 | 1 | |a Lauter, Kristin |4 edt | |
700 | 1 | |a Dai, Wei |4 edt | |
700 | 1 | |a Laine, Kim |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-77286-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-77288-8 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-77289-5 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-77287-1 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SMA | ||
940 | 1 | |q ZDB-2-SMA_2021 | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-033215101 | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-634 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-1043 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-1050 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-92 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-898 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-861 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-863 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-862 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-523 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-91 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-384 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-19 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-703 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-20 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-706 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-824 |p ZDB-2-SMA |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-77287-1 |l DE-739 |p ZDB-2-SMA |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 964645 |
---|---|
_version_ | 1819652017171202048 |
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Lauter, Kristin Dai, Wei Laine, Kim |
author2_role | edt edt edt |
author2_variant | k l kl w d wd k l kl |
author_facet | Lauter, Kristin Dai, Wei Laine, Kim |
building | Verbundindex |
bvnumber | BV047831868 |
classification_rvk | ST 276 |
classification_tum | MAT 000 |
collection | ZDB-2-SMA |
ctrlnum | (ZDB-2-SMA)9783030772871 (OCoLC)1298741009 (DE-599)BVBBV047831868 |
dewey-full | 004.0151 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.0151 |
dewey-search | 004.0151 |
dewey-sort | 14.0151 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
discipline_str_mv | Informatik Mathematik |
doi_str_mv | 10.1007/978-3-030-77287-1 |
edition | 1st ed. 2021 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV047831868</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220211s2021 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030772871</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-77287-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-77287-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SMA)9783030772871</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1298741009</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047831868</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-384</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-1043</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.0151</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Protecting Privacy through Homomorphic Encryption</subfield><subfield code="c">edited by Kristin Lauter, Wei Dai, Kim Laine</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XVI, 176 p. 35 illus., 28 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematical Applications in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algebraic Geometry</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Science and Technology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science—Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algebraic geometry</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection—Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security systems</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lauter, Kristin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Dai, Wei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Laine, Kim</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-77286-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-77288-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-77289-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SMA</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SMA_2021</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033215101</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-1043</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-863</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-862</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-824</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-77287-1</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-SMA</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047831868 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:09:28Z |
indexdate | 2024-12-28T04:09:53Z |
institution | BVB |
isbn | 9783030772871 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033215101 |
oclc_num | 1298741009 |
open_access_boolean | |
owner | DE-384 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1043 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-824 DE-703 DE-706 DE-739 DE-634 |
owner_facet | DE-384 DE-91 DE-BY-TUM DE-19 DE-BY-UBM DE-1043 DE-898 DE-BY-UBR DE-861 DE-188 DE-523 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-92 DE-824 DE-703 DE-706 DE-739 DE-634 |
physical | 1 Online-Ressource (XVI, 176 p. 35 illus., 28 illus. in color) |
psigel | ZDB-2-SMA ZDB-2-SMA_2021 |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Springer International Publishing Springer |
record_format | marc |
spellingShingle | Protecting Privacy through Homomorphic Encryption Mathematical Applications in Computer Science Cryptology Number Theory Algebraic Geometry Privacy Security Science and Technology Computer science—Mathematics Cryptography Data encryption (Computer science) Number theory Algebraic geometry Data protection—Law and legislation Security systems |
title | Protecting Privacy through Homomorphic Encryption |
title_auth | Protecting Privacy through Homomorphic Encryption |
title_exact_search | Protecting Privacy through Homomorphic Encryption |
title_exact_search_txtP | Protecting Privacy through Homomorphic Encryption |
title_full | Protecting Privacy through Homomorphic Encryption edited by Kristin Lauter, Wei Dai, Kim Laine |
title_fullStr | Protecting Privacy through Homomorphic Encryption edited by Kristin Lauter, Wei Dai, Kim Laine |
title_full_unstemmed | Protecting Privacy through Homomorphic Encryption edited by Kristin Lauter, Wei Dai, Kim Laine |
title_short | Protecting Privacy through Homomorphic Encryption |
title_sort | protecting privacy through homomorphic encryption |
topic | Mathematical Applications in Computer Science Cryptology Number Theory Algebraic Geometry Privacy Security Science and Technology Computer science—Mathematics Cryptography Data encryption (Computer science) Number theory Algebraic geometry Data protection—Law and legislation Security systems |
topic_facet | Mathematical Applications in Computer Science Cryptology Number Theory Algebraic Geometry Privacy Security Science and Technology Computer science—Mathematics Cryptography Data encryption (Computer science) Number theory Algebraic geometry Data protection—Law and legislation Security systems |
url | https://doi.org/10.1007/978-3-030-77287-1 |
work_keys_str_mv | AT lauterkristin protectingprivacythroughhomomorphicencryption AT daiwei protectingprivacythroughhomomorphicencryption AT lainekim protectingprivacythroughhomomorphicencryption |