|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
b3260889 |
003 |
MWH |
005 |
20191027122948.0 |
007 |
cr nn 008mamaa |
008 |
181205s2018 gw | s |||| 0|eng d |
020 |
|
|
|a 9783030053789
|
024 |
7 |
|
|a 10.1007/978-3-030-05378-9
|2 doi
|
035 |
|
|
|a (DE-He213)978-3-030-05378-9
|
050 |
|
4 |
|a E-Book
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 thema
|
072 |
|
7 |
|a URY
|2 thema
|
245 |
1 |
0 |
|a Progress in Cryptology – INDOCRYPT 2018
|h [electronic resource] :
|b 19th International Conference on Cryptology in India, New Delhi, India, December 9–12, 2018, Proceedings /
|c edited by Debrup Chakraborty, Tetsu Iwata.
|
250 |
|
|
|a 1st ed. 2018.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2018.
|
300 |
|
|
|a XXI, 399 p. 54 illus., 13 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Security and Cryptology ;
|v 11356
|
490 |
1 |
|
|a Springer eBook Collection
|
505 |
0 |
|
|a Outsourced Computation and Searchable Encryption -- Symmetric Key Cryptography and Format Preserving Encryption -- Fault Attacks and Hash Functions -- Post Quantum Cryptography -- Asymmetric Key Cryptography and Cryptanalysis -- Symmetric Key Cryptanalysis -- Theory -- Secure Computations and Protocols.
|
520 |
|
|
|a This book constitutes the refereed proceedings of the 19th International Conference on Cryptology in India, INDOCRYPT 2018, held in New Delhi, India, in December 2018. The 20 revised full papers presented in this book were carefully reviewed and selected from 60 submissions. The focus of the conference includes works on outsourced computation and searchable encryption; symmetric key cryptography and format preserving encryption; fault attacks and Hash functions; post quantum cryptography; asymmetric key cryptography and cryptanalysis; symmetric key cryptanalysis; theory; and secure computations and protocols.
|
590 |
|
|
|a Loaded electronically.
|
590 |
|
|
|a Electronic access restricted to members of the Holy Cross Community.
|
650 |
|
0 |
|a Data encryption (Computer science).
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
|
0 |
|a Software engineering.
|
690 |
|
|
|a Electronic resources (E-books)
|
700 |
1 |
|
|a Chakraborty, Debrup.
|e editor.
|0 (orcid)0000-0001-5179-1971
|1 https://orcid.org/0000-0001-5179-1971
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Iwata, Tetsu.
|e editor.
|0 (orcid)0000-0002-4729-0979
|1 https://orcid.org/0000-0002-4729-0979
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
830 |
|
0 |
|a Security and Cryptology ;
|v 11356
|
830 |
|
0 |
|a Springer eBook Collection.
|
856 |
4 |
0 |
|u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/978-3-030-05378-9
|3 Click to view e-book
|t 0
|
907 |
|
|
|a .b32608895
|b 04-18-22
|c 02-26-20
|
998 |
|
|
|a he
|b 02-26-20
|c m
|d @
|e -
|f eng
|g gw
|h 0
|i 1
|
912 |
|
|
|a ZDB-2-SCS
|
912 |
|
|
|a ZDB-2-LNC
|
950 |
|
|
|a Computer Science (Springer-11645)
|
902 |
|
|
|a springer purchased ebooks
|
903 |
|
|
|a SEB-COLL
|
945 |
|
|
|f - -
|g 1
|h 0
|j - -
|k - -
|l he
|o -
|p $0.00
|q -
|r -
|s b
|t 38
|u 0
|v 0
|w 0
|x 0
|y .i21740513
|z 02-26-20
|
999 |
f |
f |
|i 8d2b708d-e409-59ee-b07b-7732c22c746d
|s b8dcd320-06dc-57f4-9557-8e9556de48a1
|t 0
|
952 |
f |
f |
|p Online
|a College of the Holy Cross
|b Main Campus
|c E-Resources
|d Online
|t 0
|e E-Book
|h Library of Congress classification
|i Elec File
|