00898cam1 2200289 450 E60020006890320101118101230.020101118f0000 |||||ita|0103 balatitaITP. Vergilii Maronis AeneidosMilanoC. Signorelliv.16 cmRomana Exemplaria(ac)001LAEC000289412001 *Romana Exemplaria001E6002000679912000 Liber quartus001E6002000689042000 Liber primus001E6002000689052000 Liber secundus001E6002000689062000 Liber sextusVergilius Maro, PubliusAF000070400707260ITUNISOB20101118RICAE600200068903M 102 Monografia moderna SBNMP. Vergilii Maronis Aeneidos1700246UNISOB03602nam 22008415 450 991048455210332120251226203004.03-662-46494-210.1007/978-3-662-46494-6(CKB)3710000000379734(SSID)ssj0001465756(PQKBManifestationID)11967647(PQKBTitleCode)TC0001465756(PQKBWorkID)11495499(PQKB)10719183(DE-He213)978-3-662-46494-6(MiAaPQ)EBC6303485(MiAaPQ)EBC5592145(Au-PeEL)EBL5592145(OCoLC)1066179561(PPN)184894808(EXLCZ)99371000000037973420150310d2015 u| 0engurnn#008mamaatxtccrTheory of Cryptography 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I /edited by Yevgeniy Dodis, Jesper Buus Nielsen1st ed. 2015.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2015.1 online resource (XX, 660 p. 89 illus.)Security and Cryptology,2946-1863 ;9014Bibliographic Level Mode of Issuance: Monograph3-662-46493-4 Includes bibliographical references and index.Foundations -- Symmetric Key -- Multiparty Computation -- Concurrent and Resettable Security -- Non-malleable Codes and Tampering -- Privacy Amplification -- Encryption and Key Exchange.The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.Security and Cryptology,2946-1863 ;9014CryptographyData encryption (Computer science)Data protectionComputer scienceAlgorithmsComputer scienceMathematicsDiscrete mathematicsCryptologyData and Information SecurityTheory of ComputationAlgorithmsDiscrete Mathematics in Computer ScienceCryptography.Data encryption (Computer science)Data protection.Computer science.Algorithms.Computer scienceMathematics.Discrete mathematics.Cryptology.Data and Information Security.Theory of Computation.Algorithms.Discrete Mathematics in Computer Science.005.82Dodis Yevgeniyedthttp://id.loc.gov/vocabulary/relators/edtNielsen Jesper Buusedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484552103321Theory of Cryptography3000229UNINA