Theory of Cryptography: 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings: Lecture Notes in Computer Science, cartea 4392
Editat de Salil P. Vadhanen Limba Engleză Paperback – 7 feb 2007
Din seria Lecture Notes in Computer Science
- 20%
Preț: 426.75 lei - 20%
Preț: 315.62 lei - 20%
Preț: 320.92 lei - 15%
Preț: 426.53 lei - 20%
Preț: 313.87 lei - 20%
Preț: 355.79 lei - 20%
Preț: 355.54 lei - 20%
Preț: 355.18 lei - 20%
Preț: 390.68 lei - 20%
Preț: 392.03 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.79 lei - 20%
Preț: 495.44 lei - 20%
Preț: 498.80 lei - 20%
Preț: 498.50 lei - 20%
Preț: 355.93 lei - 20%
Preț: 639.52 lei - 20%
Preț: 499.90 lei - 20%
Preț: 498.95 lei - 20%
Preț: 390.42 lei - 20%
Preț: 326.81 lei - 20%
Preț: 391.36 lei - 20%
Preț: 321.68 lei - 20%
Preț: 498.90 lei - 20%
Preț: 312.82 lei - 20%
Preț: 496.73 lei - 20%
Preț: 320.72 lei - 20%
Preț: 497.25 lei - 15%
Preț: 496.40 lei - 20%
Preț: 324.19 lei - 20%
Preț: 498.80 lei - 20%
Preț: 461.86 lei - 20%
Preț: 355.59 lei -
Preț: 418.19 lei - 20%
Preț: 498.59 lei - 20%
Preț: 391.28 lei - 20%
Preț: 355.69 lei - 15%
Preț: 499.72 lei - 20%
Preț: 499.40 lei - 20%
Preț: 458.84 lei - 20%
Preț: 390.42 lei - 20%
Preț: 270.68 lei - 20%
Preț: 497.75 lei - 20%
Preț: 423.78 lei - 20%
Preț: 322.32 lei - 20%
Preț: 322.09 lei - 20%
Preț: 427.09 lei - 20%
Preț: 499.90 lei - 20%
Preț: 463.03 lei
Preț: 632.02 lei
Preț vechi: 743.56 lei
-15% Nou
Puncte Express: 948
Preț estimativ în valută:
111.84€ • 130.43$ • 98.20£
111.84€ • 130.43$ • 98.20£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540709350
ISBN-10: 3540709355
Pagini: 612
Ilustrații: XI, 595 p.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.89 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540709355
Pagini: 612
Ilustrații: XI, 595 p.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.89 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
Academic/professional/technical: Research and professionalCuprins
Encryption I.- Does Privacy Require True Randomness?.- Tackling Adaptive Corruptions in Multicast Encryption Protocols.- Universally Composable Security.- Long-Term Security and Universal Composability.- Universally Composable Security with Global Setup.- Arguments and Zero Knowledge.- Parallel Repetition of Computationally Sound Protocols Revisited.- Lower Bounds for Non-interactive Zero-Knowledge.- Perfect NIZK with Adaptive Soundness.- Notions of Security.- Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.- On the Necessity of Rewinding in Secure Multiparty Computation.- On Expected Probabilistic Polynomial-Time Adversaries: A Suggestion for Restricted Definitions and Their Benefits.- Obfuscation.- On Best-Possible Obfuscation.- Obfuscation for Cryptographic Purposes.- Securely Obfuscating Re-encryption.- Secret Sharing and Multiparty Computation.- Weakly-Private Secret Sharing Schemes.- On Secret Sharing Schemes, Matroids and Polymatroids.- Secure Linear Algebra Using Linearly Recurrent Sequences.- Towards Optimal and Efficient Perfectly Secure Message Transmission.- Signatures and Watermarking.- Concurrently-Secure Blind Signatures Without Random Oracles or Setup Assumptions.- Designated Confirmer Signatures Revisited.- From Weak to Strong Watermarking.- Private Approximation and Black-Box Reductions.- Private Approximation of Clustering and Vertex Cover.- Robuster Combiners for Oblivious Transfer.- One-Way Permutations, Interactive Hashing and Statistically Hiding Commitments.- Towards a Separation of Semantic and CCA Security for Public Key Encryption.- Key Establishment.- Unifying Classical and Quantum Key Distillation.- Intrusion-Resilient Key Exchange in the Bounded Retrieval Model.- (Password) Authenticated Key Establishment:From 2-Party to Group.- Encryption II.- Multi-authority Attribute Based Encryption.- Conjunctive, Subset, and Range Queries on Encrypted Data.- How to Shuffle in Public.- Evaluating Branching Programs on Encrypted Data.