Theory of Cryptography: 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II

Author:   Yevgeniy Dodis ,  Jesper Buus Nielsen
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2015 ed.
Volume:   9015
ISBN:  

9783662464960


Pages:   700
Publication Date:   19 March 2015
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $116.41 Quantity:  
Add to Cart

Share |

Theory of Cryptography: 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II


Add your own review!

Overview

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.

Full Product Details

Author:   Yevgeniy Dodis ,  Jesper Buus Nielsen
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2015 ed.
Volume:   9015
Dimensions:   Width: 15.50cm , Height: 3.70cm , Length: 23.50cm
Weight:   1.086kg
ISBN:  

9783662464960


ISBN 10:   3662464969
Pages:   700
Publication Date:   19 March 2015
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Pseudorandom Functions and Applications.- Proofs and Verifiable Computation.- Differential Privacy.- Functional Encryption.- Obfuscation.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List