Secure Multi-Party Computation Against Passive Adversaries:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2022
Cham Springer |
Ausgabe: | 1st ed. 2022 |
Schriftenreihe: | Synthesis Lectures on Distributed Computing Theory
|
Schlagworte: | |
Online-Zugang: | FHI01 Volltext |
Beschreibung: | 1 Online-Ressource (XIII, 231 p. 85 illus., 50 illus. in color) |
ISBN: | 9783031121647 |
ISSN: | 2155-1634 |
DOI: | 10.1007/978-3-031-12164-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048813669 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230214s2022 |||| o||u| ||||||eng d | ||
020 | |a 9783031121647 |c Online |9 978-3-031-12164-7 | ||
024 | 7 | |a 10.1007/978-3-031-12164-7 |2 doi | |
035 | |a (ZDB-2-SXSC)9783031121647 | ||
035 | |a (OCoLC)1371317952 | ||
035 | |a (DE-599)BVBBV048813669 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
082 | 0 | |a 005.824 |2 23 | |
100 | 1 | |a Choudhury, Ashish |e Verfasser |4 aut | |
245 | 1 | 0 | |a Secure Multi-Party Computation Against Passive Adversaries |c by Ashish Choudhury, Arpita Patra |
250 | |a 1st ed. 2022 | ||
264 | 1 | |a Cham |b Springer International Publishing |c 2022 | |
264 | 1 | |a Cham |b Springer | |
300 | |a 1 Online-Ressource (XIII, 231 p. 85 illus., 50 illus. in color) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Synthesis Lectures on Distributed Computing Theory |x 2155-1634 | |
650 | 4 | |a Cryptology | |
650 | 4 | |a Security Services | |
650 | 4 | |a Data and Information Security | |
650 | 4 | |a Privacy | |
650 | 4 | |a Principles and Models of Security | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Data protection | |
650 | 4 | |a Data protection—Law and legislation | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks—Security measures | |
700 | 1 | |a Patra, Arpita |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-12163-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-12165-4 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-031-12166-1 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-031-12164-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SXSC | ||
940 | 1 | |q ZDB-2-SXSC_2022 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-034079538 | ||
966 | e | |u https://doi.org/10.1007/978-3-031-12164-7 |l FHI01 |p ZDB-2-SXSC |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184900264263680 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Choudhury, Ashish Patra, Arpita |
author_facet | Choudhury, Ashish Patra, Arpita |
author_role | aut aut |
author_sort | Choudhury, Ashish |
author_variant | a c ac a p ap |
building | Verbundindex |
bvnumber | BV048813669 |
collection | ZDB-2-SXSC |
ctrlnum | (ZDB-2-SXSC)9783031121647 (OCoLC)1371317952 (DE-599)BVBBV048813669 |
dewey-full | 005.824 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.824 |
dewey-search | 005.824 |
dewey-sort | 15.824 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-031-12164-7 |
edition | 1st ed. 2022 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02067nmm a2200565zcb4500</leader><controlfield tag="001">BV048813669</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230214s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783031121647</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-031-12164-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-031-12164-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SXSC)9783031121647</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1371317952</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048813669</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.824</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Choudhury, Ashish</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Secure Multi-Party Computation Against Passive Adversaries</subfield><subfield code="c">by Ashish Choudhury, Arpita Patra</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XIII, 231 p. 85 illus., 50 illus. in color)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Synthesis Lectures on Distributed Computing Theory</subfield><subfield code="x">2155-1634</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security Services</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data and Information Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Principles and Models of Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection—Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Patra, Arpita</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-12163-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-12165-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-031-12166-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-031-12164-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SXSC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SXSC_2022</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034079538</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-031-12164-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SXSC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048813669 |
illustrated | Not Illustrated |
index_date | 2024-07-03T21:30:59Z |
indexdate | 2024-07-10T09:46:41Z |
institution | BVB |
isbn | 9783031121647 |
issn | 2155-1634 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034079538 |
oclc_num | 1371317952 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | 1 Online-Ressource (XIII, 231 p. 85 illus., 50 illus. in color) |
psigel | ZDB-2-SXSC ZDB-2-SXSC_2022 |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | Springer International Publishing Springer |
record_format | marc |
series2 | Synthesis Lectures on Distributed Computing Theory |
spelling | Choudhury, Ashish Verfasser aut Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury, Arpita Patra 1st ed. 2022 Cham Springer International Publishing 2022 Cham Springer 1 Online-Ressource (XIII, 231 p. 85 illus., 50 illus. in color) txt rdacontent c rdamedia cr rdacarrier Synthesis Lectures on Distributed Computing Theory 2155-1634 Cryptology Security Services Data and Information Security Privacy Principles and Models of Security Mobile and Network Security Cryptography Data encryption (Computer science) Data protection Data protection—Law and legislation Computer security Computer networks—Security measures Patra, Arpita aut Erscheint auch als Druck-Ausgabe 978-3-031-12163-0 Erscheint auch als Druck-Ausgabe 978-3-031-12165-4 Erscheint auch als Druck-Ausgabe 978-3-031-12166-1 https://doi.org/10.1007/978-3-031-12164-7 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Choudhury, Ashish Patra, Arpita Secure Multi-Party Computation Against Passive Adversaries Cryptology Security Services Data and Information Security Privacy Principles and Models of Security Mobile and Network Security Cryptography Data encryption (Computer science) Data protection Data protection—Law and legislation Computer security Computer networks—Security measures |
title | Secure Multi-Party Computation Against Passive Adversaries |
title_auth | Secure Multi-Party Computation Against Passive Adversaries |
title_exact_search | Secure Multi-Party Computation Against Passive Adversaries |
title_exact_search_txtP | Secure Multi-Party Computation Against Passive Adversaries |
title_full | Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury, Arpita Patra |
title_fullStr | Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury, Arpita Patra |
title_full_unstemmed | Secure Multi-Party Computation Against Passive Adversaries by Ashish Choudhury, Arpita Patra |
title_short | Secure Multi-Party Computation Against Passive Adversaries |
title_sort | secure multi party computation against passive adversaries |
topic | Cryptology Security Services Data and Information Security Privacy Principles and Models of Security Mobile and Network Security Cryptography Data encryption (Computer science) Data protection Data protection—Law and legislation Computer security Computer networks—Security measures |
topic_facet | Cryptology Security Services Data and Information Security Privacy Principles and Models of Security Mobile and Network Security Cryptography Data encryption (Computer science) Data protection Data protection—Law and legislation Computer security Computer networks—Security measures |
url | https://doi.org/10.1007/978-3-031-12164-7 |
work_keys_str_mv | AT choudhuryashish securemultipartycomputationagainstpassiveadversaries AT patraarpita securemultipartycomputationagainstpassiveadversaries |