An Introduction to Secret Sharing (Record no. 15325)

MARC details
000 -LEADER
fixed length control field 02055nam a2200349Ia 4500
000 - LEADER
fixed length control field 02621nam a22003735i 4500
001 - CONTROL NUMBER
control field 978-3-031-28161-7
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240319120926.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230328s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031281617
-- 978-3-031-28161-7
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 5.824
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Krenn, Stephan.
9 (RLIN) 32752
245 ## - TITLE STATEMENT
Title An Introduction to Secret Sharing
Statement of responsibility, etc. by Stephan Krenn, Thomas LorĂ¼nser.
Medium [electronic resource] :
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cham
Name of publisher, distributor, etc. Springer International Publishing
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent X, 76 p. 8 illus., 6 illus. in color.
Other physical details online resource.
520 ## - SUMMARY, ETC.
Summary, etc. This book provides an introduction to secret sharing, a key technology for practical applications and higher-level cryptographic protocols. This survey analyzes existing work, and systematically presents secret sharing protocols for various adversary models. It provides intuitive as well as formal descriptions of the different types of adversaries, including their computational powers and capabilities. In addition, it then offers guidance and support in selecting the appropriate type of protocol for a given application domain, present representative protocols, and provide useful references for further reading and research. This book aims to support software developers and engineers in realizing highly secure cloud-based applications, and also provides an introduction to the field including some relevant technical background for interested students and computer scientists.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cloud Computing.
9 (RLIN) 32753
Topical term or geographic name entry element Cloud Computing.
9 (RLIN) 32753
Topical term or geographic name entry element Computer Networks.
9 (RLIN) 32754
Topical term or geographic name entry element Computer Networks.
9 (RLIN) 32754
Topical term or geographic name entry element Cryptography.
9 (RLIN) 32755
Topical term or geographic name entry element Cryptology.
9 (RLIN) 32756
Topical term or geographic name entry element Data and Information Security.
9 (RLIN) 32757
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 32758
Topical term or geographic name entry element Data protection.
9 (RLIN) 32759
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name LorĂ¼nser, Thomas.
9 (RLIN) 32760
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-28161-7">https://doi.org/10.1007/978-3-031-28161-7</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Book
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
        S. R. Ranganathan Learning Hub S. R. Ranganathan Learning Hub Online   Veda Library Solutions Pvt. Ltd., Noida   EB2311 2024-03-19 2024-03-19 e-Book Platform:Springer