04071nam 22008655 450 991029897380332120230310222334.03-319-12229-010.1007/978-3-319-12229-8(CKB)3710000000277590(EBL)1967023(SSID)ssj0001386061(PQKBManifestationID)11781019(PQKBTitleCode)TC0001386061(PQKBWorkID)11350239(PQKB)11024767(MiAaPQ)EBC1967023(DE-He213)978-3-319-12229-8(PPN)183091132(EXLCZ)99371000000027759020141106d2014 u| 0engur|n|---|||||txtccrHomomorphic Encryption and Applications /by Xun Yi, Russell Paulet, Elisa Bertino1st ed. 2014.Cham :Springer International Publishing :Imprint: Springer,2014.1 online resource (136 p.)SpringerBriefs in Computer Science,2191-5768Description based upon print version of record.3-319-12228-2 Includes bibliographical references.Introduction -- Homomorphic Encryption -- Fully Homomorphic Encryption -- Remote End-to-End Voting Scheme -- Nearest Neighbor Queries with Location Privacy -- Private Searching on Streaming Data.This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems.SpringerBriefs in Computer Science,2191-5768Data encryption (Computer science)PhysicsComputer science—MathematicsComputer scienceMathematicsData miningSystem safetyCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Applications of Graph Theory and Complex Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/P33010Mathematical Applications in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/M13110Data Mining and Knowledge Discoveryhttps://scigraph.springernature.com/ontologies/product-market-codes/I18030Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Data encryption (Computer science)Physics.Computer science—Mathematics.Computer scienceMathematics.Data mining.System safety.Cryptology.Applications of Graph Theory and Complex Networks.Mathematical Applications in Computer Science.Data Mining and Knowledge Discovery.Security Science and Technology.004004.0151005.82006.312621621.389Yi Xunauthttp://id.loc.gov/vocabulary/relators/aut968566Paulet Russellauthttp://id.loc.gov/vocabulary/relators/autBertino Elisaauthttp://id.loc.gov/vocabulary/relators/autMiAaPQMiAaPQMiAaPQBOOK9910298973803321Homomorphic Encryption and Applications2199993UNINA01290nam0 22002891i 450 UON0005530020231205102244.14720020107d1975 |0itac50 barusSU|||| 1||||Stanovlenie nacional'no-osvoboditel'nogo dvizenija na arabskom vostoke (seredina XIX b1908 g.)Lev Nikolaevic KotlovMoskvaIzdatel' stvo Nauka Glavnaja Redakcija Vostocnoj Literatury1975322 p.23 cmMEDIO ORIENTEMOVIMENTI POLITICIUONC002850FIPAESI ARABIStoriaSec. 16.-20.UONC008434FIRUMoskvaUONL003152ARA IV CPAESI ARABI - STORIA CONTEMPORANEA - COMUNITA' ISLAMICHE NEL MONDOAKOTLOVLev NikolaevicUONV035130652878Akademija Nauk SSSRUONV247334650ITSOL20241213RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00055300SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI ARA IV C 144 SI SA 36981 5 144 Stanovlenie nacional'no-osvoboditel'nogo dvizenija na arabskom vostoke (seredina XIX b1148427UNIOR