Applications of secure multiparty computation:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Berlin ; Tokyo ; Washington, DC
IOS Press
[2015]
|
Schriftenreihe: | Cryptology and information security series
volume 13 |
Schlagworte: | |
Online-Zugang: | kostenfrei |
Beschreibung: | Includes bibliographical references and index Open Access |
Beschreibung: | 1 Online-Ressource (ix, 253 Seiten) Illustrationen |
ISBN: | 9781614995326 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV049009361 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230619s2015 |||| o||u| ||||||eng d | ||
020 | |a 9781614995326 |q online |9 978-1-61499-532-6 | ||
035 | |a (OCoLC)1385286915 | ||
035 | |a (DE-599)BVBBV049009361 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 |2 23 | |
245 | 1 | 0 | |a Applications of secure multiparty computation |c edited by Peeter Laud and Liina Kamm |
264 | 1 | |a Amsterdam ; Berlin ; Tokyo ; Washington, DC |b IOS Press |c [2015] | |
264 | 4 | |c © 2015 | |
300 | |a 1 Online-Ressource (ix, 253 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptology and information security series |v volume 13 | |
500 | |a Includes bibliographical references and index | ||
500 | |a Open Access | ||
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Computer security | |
700 | 1 | |a Laud, Peeter |4 edt | |
700 | 1 | |a Kamm, Liina |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-61499-531-9 |
830 | 0 | |a Cryptology and information security series |v volume 13 |w (DE-604)BV035771847 |9 13 | |
856 | 4 | 0 | |u https://ebooks.iospress.nl/isbn/978-1-61499-532-6 |x Verlag |z kostenfrei |3 Volltext |
912 | |a ZDB-218-IOS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-034272453 |
Datensatz im Suchindex
_version_ | 1804185278138548224 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author2 | Laud, Peeter Kamm, Liina |
author2_role | edt edt |
author2_variant | p l pl l k lk |
author_facet | Laud, Peeter Kamm, Liina |
building | Verbundindex |
bvnumber | BV049009361 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-218-IOS |
ctrlnum | (OCoLC)1385286915 (DE-599)BVBBV049009361 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01453nmm a2200409 cb4500</leader><controlfield tag="001">BV049009361</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230619s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614995326</subfield><subfield code="q">online</subfield><subfield code="9">978-1-61499-532-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1385286915</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049009361</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Applications of secure multiparty computation</subfield><subfield code="c">edited by Peeter Laud and Liina Kamm</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam ; Berlin ; Tokyo ; Washington, DC</subfield><subfield code="b">IOS Press</subfield><subfield code="c">[2015]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (ix, 253 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">volume 13</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Open Access</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Laud, Peeter</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kamm, Liina</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-61499-531-9</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series</subfield><subfield code="v">volume 13</subfield><subfield code="w">(DE-604)BV035771847</subfield><subfield code="9">13</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebooks.iospress.nl/isbn/978-1-61499-532-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-218-IOS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034272453</subfield></datafield></record></collection> |
id | DE-604.BV049009361 |
illustrated | Not Illustrated |
index_date | 2024-07-03T22:11:10Z |
indexdate | 2024-07-10T09:52:41Z |
institution | BVB |
isbn | 9781614995326 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034272453 |
oclc_num | 1385286915 |
open_access_boolean | 1 |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (ix, 253 Seiten) Illustrationen |
psigel | ZDB-218-IOS |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | IOS Press |
record_format | marc |
series | Cryptology and information security series |
series2 | Cryptology and information security series |
spelling | Applications of secure multiparty computation edited by Peeter Laud and Liina Kamm Amsterdam ; Berlin ; Tokyo ; Washington, DC IOS Press [2015] © 2015 1 Online-Ressource (ix, 253 Seiten) Illustrationen txt rdacontent c rdamedia cr rdacarrier Cryptology and information security series volume 13 Includes bibliographical references and index Open Access Data encryption (Computer science) Computer security Laud, Peeter edt Kamm, Liina edt Erscheint auch als Druck-Ausgabe 978-1-61499-531-9 Cryptology and information security series volume 13 (DE-604)BV035771847 13 https://ebooks.iospress.nl/isbn/978-1-61499-532-6 Verlag kostenfrei Volltext |
spellingShingle | Applications of secure multiparty computation Cryptology and information security series Data encryption (Computer science) Computer security |
title | Applications of secure multiparty computation |
title_auth | Applications of secure multiparty computation |
title_exact_search | Applications of secure multiparty computation |
title_exact_search_txtP | Applications of secure multiparty computation |
title_full | Applications of secure multiparty computation edited by Peeter Laud and Liina Kamm |
title_fullStr | Applications of secure multiparty computation edited by Peeter Laud and Liina Kamm |
title_full_unstemmed | Applications of secure multiparty computation edited by Peeter Laud and Liina Kamm |
title_short | Applications of secure multiparty computation |
title_sort | applications of secure multiparty computation |
topic | Data encryption (Computer science) Computer security |
topic_facet | Data encryption (Computer science) Computer security |
url | https://ebooks.iospress.nl/isbn/978-1-61499-532-6 |
volume_link | (DE-604)BV035771847 |
work_keys_str_mv | AT laudpeeter applicationsofsecuremultipartycomputation AT kammliina applicationsofsecuremultipartycomputation |