LEADER 05643nam 22008895 450 001 9910484779603321 005 20251226202916.0 010 $a3-540-32732-0 024 7 $a10.1007/11681878 035 $a(CKB)1000000000232851 035 $a(SSID)ssj0000320389 035 $a(PQKBManifestationID)11286214 035 $a(PQKBTitleCode)TC0000320389 035 $a(PQKBWorkID)10249328 035 $a(PQKB)10884303 035 $a(DE-He213)978-3-540-32732-5 035 $a(MiAaPQ)EBC3067812 035 $a(PPN)123132096 035 $a(BIP)34163978 035 $a(BIP)13291443 035 $a(EXLCZ)991000000000232851 100 $a20100715d2006 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTheory of Cryptography $eThird Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings /$fedited by Shai Halevi, Tal Rabin 205 $a1st ed. 2006. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2006. 215 $a1 online resource (XII, 620 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3876 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-32731-2 320 $aIncludes bibliographical references and index. 327 $aZero-Knowledge -- Concurrent Zero Knowledge Without Complexity Assumptions -- Interactive Zero-Knowledge with Restricted Random Oracles -- Non-interactive Zero-Knowledge from Homomorphic Encryption -- Primitives -- Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles -- Efficient Blind and Partially Blind Signatures Without Random Oracles -- Key Exchange Using Passwords and Long Keys -- Mercurial Commitments: Minimal Assumptions and Efficient Constructions -- Assumptions and Models -- Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices -- On Error Correction in the Exponent -- On the Relation Between the Ideal Cipher and the Random Oracle Models -- The Bounded-Retrieval Model -- Intrusion-Resilience Via the Bounded-Storage Model -- Perfectly Secure Password Protocols in the Bounded Retrieval Model -- Privacy -- Polylogarithmic Private Approximations and Efficient Matching -- Calibrating Noise to Sensitivity in Private Data Analysis -- Secret Sharing and Multi-party Computation (I) -- Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation -- Efficient Multi-party Computation with Dispute Control -- Round-Optimal and Efficient Verifiable Secret Sharing -- Universally-Composible Security -- Generalized Environmental Security from Number Theoretic Assumptions -- Games and the Impossibility of Realizable Ideal Functionality -- Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols -- Resource Fairness and Composability of Cryptographic Protocols -- One-Way Functions and Friends -- Finding Pessiland -- Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness -- On the Complexity of Parallel Hardness Amplification for One-Way Functions -- Secret Sharing and Multi-party Computation (II) -- On Matroids and Non-ideal Secret Sharing -- Secure Computation with Partial Message Loss -- Communication Efficient Secure Linear Algebra -- Threshold and Proactive Pseudo-Random Permutations -- Pseudo-Random Functions and Encryption -- PRF Domain Extension Using DAGs -- Chosen-Ciphertext Security from Tag-Based Encryption -- Separating Sources for Encryption and Secret Sharing. 330 $aThis book constitutes the refereed proceedings of the Third Theory of Cryptography Conference, TCC 2006, held in March 2006. The 31 revised full papers presented were carefully reviewed and selected from 91 submissions. The papers are organized in topical sections on zero-knowledge, primitives, assumptions and models, the bounded-retrieval model, privacy, secret sharing and multi-party computation, universally-composible security, one-way functions and friends, and pseudo-random functions and encryption. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3876 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aOperating systems (Computers) 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aCryptology 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 606 $aOperating Systems 606 $aIT Operations 606 $aComputers and Society 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aOperating systems (Computers). 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aOperating Systems. 615 24$aIT Operations. 615 24$aComputers and Society. 676 $a005.8 701 $aHalevi$b Shai$01754266 701 $aRabin$b Tal$01757814 712 12$aTheory of Cryptography Conference 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484779603321 996 $aTheory of cryptography$94201628 997 $aUNINA LEADER 05754nam 22008295 450 001 996630865003316 005 20250626164414.0 010 $a9783031729409$b(electronic bk.) 010 $z9783031729393 024 7 $a10.1007/978-3-031-72940-9 035 $a(MiAaPQ)EBC31784953 035 $a(Au-PeEL)EBL31784953 035 $a(CKB)36590717600041 035 $a(DE-He213)978-3-031-72940-9 035 $a(OCoLC)1472988375 035 $a(EXLCZ)9936590717600041 100 $a20241117d2025 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aComputer Vision ? ECCV 2024 $e18th European Conference, Milan, Italy, September 29?October 4, 2024, Proceedings, Part XLI /$fedited by Ale? Leonardis, Elisa Ricci, Stefan Roth, Olga Russakovsky, Torsten Sattler, Gül Varol 205 $a1st ed. 2025. 210 1$aCham :$cSpringer Nature Switzerland :$cImprint: Springer,$d2025. 215 $a1 online resource (0 pages) 225 1 $aLecture Notes in Computer Science,$x1611-3349 ;$v15099 311 08$aPrint version: Leonardis, Ales Computer Vision - ECCV 2024 Cham : Springer,c2024 9783031729393 327 $aAudio-Synchronized Visual Animation -- Expressive Whole-Body 3D Gaussian Avatar -- Canonical Shape Projection is All You Need for 3D Few-shot Class Incremental Learning -- Controllable Human-Object Interaction Synthesis -- High-Fidelity and Transferable NeRF Editing by Frequency Decomposition -- DoughNet: A Visual Predictive Model for Topological Manipulation of Deformable Objects -- PAV: Personalized Head Avatar from Unstructured Video Collection -- Strike a Balance in Continual Panoptic Segmentation -- In Defense of Lazy Visual Grounding for Open-Vocabulary Semantic Segmentation -- MultiDelete for Multimodal Machine Unlearning -- Unified Local-Cloud Decision-Making via Reinforcement Learning -- UniTalker: Scaling up Audio-Driven 3D Facial Animation through A Unified Model -- Robo-ABC: Affordance Generalization Beyond Categories via Semantic Correspondence for Robot Manipulation -- Efficient Frequency-Domain Image Deraining with Contrastive Regularization -- Stitched ViTs are Flexible Vision Backbones -- TrajPrompt: Aligning Color Trajectory with Vision-Language Representations -- SemReg: Semantics Constrained Point Cloud Registration -- Cascade-Zero123: One Image to Highly Consistent 3D with Self-Prompted Nearby Views -- RoScenes: A Large-scale Multi-view 3D Dataset for Roadside Perception -- ReSyncer: Rewiring Style-based Generator for Unified Audio-Visually Synced Facial Performer -- Language-Driven Physics-Based Scene Synthesis and Editing via Feature Splatting -- AlignDiff: Aligning Diffusion Models for General Few-Shot Segmentation -- SkateFormer: Skeletal-Temporal Transformer for Human Action Recognition -- R^2-Tuning: Efficient Image-to-Video Transfer Learning for Video Temporal Grounding -- Tree-D Fusion: Simulation-Ready Tree Dataset from Single Images with Diffusion Priors -- Parameterization-driven Neural Surface Reconstruction for Object-oriented Editing in Neural Rendering -- DomainFusion: Generalizing To Unseen Domains with Latent Diffusion Models. 330 $aThe multi-volume set of LNCS books with volume numbers 15059 up to 15147 constitutes the refereed proceedings of the 18th European Conference on Computer Vision, ECCV 2024, held in Milan, Italy, during September 29?October 4, 2024. The 2387 papers presented in these proceedings were carefully reviewed and selected from a total of 8585 submissions. The papers deal with topics such as computer vision; machine learning; deep neural networks; reinforcement learning; object recognition; image classification; image processing; object detection; semantic segmentation; human pose estimation; 3d reconstruction; stereo vision; computational photography; neural networks; image coding; image reconstruction; motion estimation. 410 0$aLecture Notes in Computer Science,$x1611-3349 ;$v15099 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aImage processing 606 $aComputer networks 606 $aUser interfaces (Computer systems) 606 $aHuman-computer interaction 606 $aMachine learning 606 $aComputers, Special purpose 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aImage Processing 606 $aComputer Communication Networks 606 $aUser Interfaces and Human Computer Interaction 606 $aMachine Learning 606 $aSpecial Purpose and Application-Based Systems 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aImage processing. 615 0$aComputer networks. 615 0$aUser interfaces (Computer systems) 615 0$aHuman-computer interaction. 615 0$aMachine learning. 615 0$aComputers, Special purpose. 615 14$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aImage Processing. 615 24$aComputer Communication Networks. 615 24$aUser Interfaces and Human Computer Interaction. 615 24$aMachine Learning. 615 24$aSpecial Purpose and Application-Based Systems. 676 $a006 700 $aLeonardis$b Ales?$01757791 701 $aRicci$b Elisa$0216674 701 $aRoth$b S?tefan$00 701 $aRussakovsky$b Olga$01767663 701 $aSattler$b Torsten$01767664 701 $aVarol$b Gül$01767665 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a996630865003316 996 $aComputer Vision ? ECCV 2024$94213977 997 $aUNISA