1.

Record Nr.

UNINA990001300070403321

Autore

Hayman, Walter Kurt

Titolo

Research Problems in Function Theory / W. K. Hayman

Pubbl/distr/stampa

London : Athlone Press, 1967

Disciplina

511.33

Locazione

MA1

Collocazione

3-F-33-(BIS

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNINA9910483506903321

Titolo

Security and Cryptography for Networks : 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings / / edited by Michel Abdalla, Roberto De Prisco

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014

ISBN

3-319-10879-4

Edizione

[1st ed. 2014.]

Descrizione fisica

1 online resource (XX, 609 p. 101 illus.)

Collana

Security and Cryptology, , 2946-1863 ; ; 8642

Disciplina

005.82

Soggetti

Cryptography

Data encryption (Computer science)

Data protection

Electronic data processing - Management

Cryptology

Data and Information Security

IT Operations

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph



Nota di contenuto

Key exchange -- Multilinear maps and obfuscation.-Pseudorandom function extensions -- Secure computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis -- Secure computation - implementation -- Zero knowledge -- Message authentication -- Proofs of space and erasure -- Public-key encryption.

Sommario/riassunto

This book constitutes the proceedings of the 9th International Conference on Security and Cryptography, SCN 2014, held in Amalfi, Italy, in September 2014. The 31 papers presented in this volume were carefully reviewed and selected from 95 submissions. They are organized in topical sections on key exchange; multilinear maps and obfuscation; pseudorandom function extensions; secure computation - foundations and algorithms; network security; functional encryption; cryptanalysis; secure computation - implementation; zero knowledge; message authentication; proofs of space and erasure; public-key encryption.