LEADER 03597nam 22008655 450 001 9910298973803321 005 20251223151658.0 010 $a3-319-12229-0 024 7 $a10.1007/978-3-319-12229-8 035 $a(CKB)3710000000277590 035 $a(EBL)1967023 035 $a(SSID)ssj0001386061 035 $a(PQKBManifestationID)11781019 035 $a(PQKBTitleCode)TC0001386061 035 $a(PQKBWorkID)11350239 035 $a(PQKB)11024767 035 $a(MiAaPQ)EBC1967023 035 $a(DE-He213)978-3-319-12229-8 035 $a(PPN)183091132 035 $a(EXLCZ)993710000000277590 100 $a20141106d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aHomomorphic Encryption and Applications /$fby Xun Yi, Russell Paulet, Elisa Bertino 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (136 p.) 225 1 $aSpringerBriefs in Computer Science,$x2191-5776 300 $aDescription based upon print version of record. 311 08$a3-319-12228-2 320 $aIncludes bibliographical references. 327 $aIntroduction -- Homomorphic Encryption -- Fully Homomorphic Encryption -- Remote End-to-End Voting Scheme -- Nearest Neighbor Queries with Location Privacy -- Private Searching on Streaming Data. 330 $aThis book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as their application in solving real world problems. 410 0$aSpringerBriefs in Computer Science,$x2191-5776 606 $aCryptography 606 $aData encryption (Computer science) 606 $aGraph theory 606 $aComputer science$xMathematics 606 $aData mining 606 $aSecurity systems 606 $aCryptology 606 $aGraph Theory 606 $aMathematical Applications in Computer Science 606 $aData Mining and Knowledge Discovery 606 $aSecurity Science and Technology 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aGraph theory. 615 0$aComputer science$xMathematics. 615 0$aData mining. 615 0$aSecurity systems. 615 14$aCryptology. 615 24$aGraph Theory. 615 24$aMathematical Applications in Computer Science. 615 24$aData Mining and Knowledge Discovery. 615 24$aSecurity Science and Technology. 676 $a004 676 $a004.0151 676 $a005.82 676 $a006.312 676 $a621 676 $a621.389 700 $aYi$b Xun$4aut$4http://id.loc.gov/vocabulary/relators/aut$0968566 702 $aPaulet$b Russell$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aBertino$b Elisa$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298973803321 996 $aHomomorphic Encryption and Applications$92199993 997 $aUNINA