01317nam 2200373Ia 450 99639259110331620200824132306.0(CKB)3810000000004108(EEBO)2264211168(OCoLC)ocm8959451e(OCoLC)8959451(EXLCZ)99381000000000410819821115d1695 uy |engurbn||||a|bb|Parochial antiquities attempted in the history of Ambrosden, Burcester, and other adjacent parts in the counties of Oxford and Bucks[electronic resource] /by White KennettOxford [s.n.]1695[14], 703, 146 p., [9] leaves of plates illReproduction of original in the Bodleian Library.Includes bibliographical references and index.eebo-0014Buckinghamshire (England)HistoryOxfordshire (England)HistoryKennett White1660-1728.1003535UMIUMIOCLm/cUMIWaOLNBOOK996392591103316Parochial antiquities attempted in the history of Ambrosden, Burcester, and other adjacent parts in the counties of Oxford and Bucks2405176UNISA03598nam 22008655 450 991029897380332120251223151658.03-319-12229-010.1007/978-3-319-12229-8(CKB)3710000000277590(EBL)1967023(SSID)ssj0001386061(PQKBManifestationID)11781019(PQKBTitleCode)TC0001386061(PQKBWorkID)11350239(PQKB)11024767(MiAaPQ)EBC1967023(DE-He213)978-3-319-12229-8(PPN)183091132(EXLCZ)99371000000027759020141106d2014 u| 0engur|n|---|||||txtccrHomomorphic Encryption and Applications /by Xun Yi, Russell Paulet, Elisa Bertino1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (136 p.)SpringerBriefs in Computer Science,2191-5776Description based upon print version of record.3-319-12228-2 Includes bibliographical references.Introduction -- Homomorphic Encryption -- Fully Homomorphic Encryption -- Remote End-to-End Voting Scheme -- Nearest Neighbor Queries with Location Privacy -- Private Searching on Streaming Data.This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.SpringerBriefs in Computer Science,2191-5776CryptographyData encryption (Computer science)Graph theoryComputer scienceMathematicsData miningSecurity systemsCryptologyGraph TheoryMathematical Applications in Computer ScienceData Mining and Knowledge DiscoverySecurity Science and TechnologyCryptography.Data encryption (Computer science).Graph theory.Computer scienceMathematics.Data mining.Security systems.Cryptology.Graph Theory.Mathematical Applications in Computer Science.Data Mining and Knowledge Discovery.Security Science and Technology.004004.0151005.82006.312621621.389Yi Xunauthttp://id.loc.gov/vocabulary/relators/aut968566Paulet Russellauthttp://id.loc.gov/vocabulary/relators/autBertino Elisaauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910298973803321Homomorphic Encryption and Applications2199993UNINA