Theory of cryptography [electronic resource] : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings. Part II / Yevgeniy Dodis, Jesper Buus Nielsen (eds.).
2015
QA76.9.A25
Linked e-resources
Linked Resource
Online Access
Concurrent users
Unlimited
Authorized users
Authorized users
Document Delivery Supplied
Can lend chapters, not whole ebooks
Details
Title
Theory of cryptography [electronic resource] : 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings. Part II / Yevgeniy Dodis, Jesper Buus Nielsen (eds.).
ISBN
9783662464977 electronic book
3662464977 electronic book
9783662464960
3662464977 electronic book
9783662464960
Published
Heidelberg : Springer, 2015.
Language
English
Description
1 online resource (xx, 700 pages) : illustrations.
Item Number
10.1007/978-3-662-46497-7 doi
Call Number
QA76.9.A25
Dewey Decimal Classification
005.8/2
Summary
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.
Note
International conference proceedings.
Includes author index.
Includes author index.
Access Note
Access limited to authorized users.
Source of Description
Online resource; title from PDF title page (SpringerLink, viewed March 19, 2015).
Series
Lecture notes in computer science ; 9015.
LNCS sublibrary. SL 4, Security and cryptology.
LNCS sublibrary. SL 4, Security and cryptology.
Available in Other Form
Print version: 9783662464960
Linked Resources
Online Access
Record Appears in
Online Resources > Ebooks
All Resources
All Resources
Table of Contents
Pseudorandom Functions and Applications
Proofs and Verifiable Computation
Differential Privacy
Functional Encryption
Obfuscation.
Proofs and Verifiable Computation
Differential Privacy
Functional Encryption
Obfuscation.