DSpace Repository

Theory of Cryptography [electronic resource] : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II / edited by Yevgeniy Dodis, Jesper Buus Nielsen.

Show simple item record

dc.contributor.author Dodis, Yevgeniy. editor.
dc.contributor.author Nielsen, Jesper Buus. editor.
dc.contributor.author SpringerLink (Online service)
dc.date.accessioned 2017-12-02T15:57:29Z
dc.date.available 2017-12-02T15:57:29Z
dc.date.created 2015.
dc.date.issued 2015
dc.identifier.isbn 9783662464977
dc.identifier.uri http://dspace.conacyt.gov.py/xmlui/handle/123456789/23167
dc.description XX, 700 p. 67 illus.
dc.description.abstract The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.
dc.description.tableofcontents Pseudorandom Functions and Applications -- Proofs and Verifiable Computation -- Differential Privacy -- Functional Encryption -- Obfuscation.
dc.language eng
dc.publisher Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2015.
dc.relation.ispartofseries Springer eBooks
dc.relation.ispartofseries Lecture Notes in Computer Science, 0302-9743 ; 9015
dc.relation.ispartofseries Lecture Notes in Computer Science, 0302-9743 ; 9015
dc.relation.uri http://cicco.idm.oclc.org/login?url=http://dx.doi.org/10.1007/978-3-662-46497-7
dc.subject Computer science.
dc.subject Computer security.
dc.subject Data encryption (Computer science).
dc.subject Computers.
dc.subject Algorithms.
dc.subject Computer science Mathematics.
dc.subject Computer Science.
dc.subject Data Encryption.
dc.subject Systems and Data Security.
dc.subject Computation by Abstract Devices.
dc.subject Algorithm Analysis and Problem Complexity.
dc.subject Discrete Mathematics in Computer Science.
dc.subject.ddc 005.82 23
dc.subject.lcc QA76.9.A25
dc.subject.other Computer Science (Springer-11645)
dc.title Theory of Cryptography [electronic resource] : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II / edited by Yevgeniy Dodis, Jesper Buus Nielsen.
dc.type text
dc.identifier.doi 10.1007/978-3-662-46497-7
dc.identifier.bib 978-3-662-46497-7
dc.format.rdamedia computer
dc.format.rdacarrier online resource
dc.format.rda text file PDF


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account