| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996216671903316 |
|
|
Titolo |
Family law quarterly |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chicago, Ill., : Section of Family Law, American Bar Association, ©1967- |
|
|
|
|
|
|
|
ISSN |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Domestic relations |
Prawo rodzinne |
Czasopismo prawnicze |
Periodicals. |
Stany Zjednoczone |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Periodico |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910298973803321 |
|
|
Autore |
Yi Xun |
|
|
Titolo |
Homomorphic Encryption and Applications / / by Xun Yi, Russell Paulet, Elisa Bertino |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2014.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (136 p.) |
|
|
|
|
|
|
Collana |
|
SpringerBriefs in Computer Science, , 2191-5776 |
|
|
|
|
|
|
Disciplina |
|
004 |
004.0151 |
005.82 |
006.312 |
621 |
621.389 |
|
|
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Graph theory |
Computer science - Mathematics |
Data mining |
Security systems |
Cryptology |
|
|
|
|
|
|
|
|
|
|
|
|
Graph Theory |
Mathematical Applications in Computer Science |
Data Mining and Knowledge Discovery |
Security Science and Technology |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Homomorphic Encryption -- Fully Homomorphic Encryption -- Remote End-to-End Voting Scheme -- Nearest Neighbor Queries with Location Privacy -- Private Searching on Streaming Data. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems. |
|
|
|
|
|
|
|
| |