1.

Record Nr.

UNINA990001220880403321

Autore

Feys, Robert

Titolo

Modal Logic / by Feys R.

Pubbl/distr/stampa

s.l. : Gauthier-Villars, 1965

Collana

Collection de logique mathématique

Locazione

MA1

Collocazione

11-F-7

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNISA996200343003316

Titolo

Theory of Cryptography [[electronic resource] ] : 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II / / edited by Yevgeniy Dodis, Jesper Buus Nielsen

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015

ISBN

3-662-46497-7

Edizione

[1st ed. 2015.]

Descrizione fisica

1 online resource (XX, 700 p. 67 illus.)

Collana

Security and Cryptology ; ; 9015

Disciplina

001.5436

Soggetti

Data encryption (Computer science)

Computer security

Computers

Algorithms

Computer science—Mathematics

Cryptology

Systems and Data Security

Computation by Abstract Devices

Algorithm Analysis and Problem Complexity

Discrete Mathematics in Computer Science

Lingua di pubblicazione

Inglese



Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di contenuto

Pseudorandom Functions and Applications -- Proofs and Verifiable Computation -- Differential Privacy -- Functional Encryption -- Obfuscation.

Sommario/riassunto

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.