Theory of Cryptography (Record no. 15982)

MARC details
000 -LEADER
fixed length control field 02066nam a2200409Ia 4500
000 - LEADER
fixed length control field 02565nam a22004335i 4500
001 - CONTROL NUMBER
control field 978-3-031-48624-1
003 - CONTROL NUMBER IDENTIFIER
control field DE-He213
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240319121208.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 231126s2023 sz | s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783031486241
-- 978-3-031-48624-1
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 5.824
245 ## - TITLE STATEMENT
Title Theory of Cryptography
Statement of responsibility, etc. edited by Guy Rothblum, Hoeteck Wee.
Medium [electronic resource] :
250 ## - EDITION STATEMENT
Edition statement 1st ed. 2023.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cham
Name of publisher, distributor, etc. Springer Nature Switzerland
Date of publication, distribution, etc. 2023
300 ## - PHYSICAL DESCRIPTION
Extent XII, 544 p. 56 illus., 6 illus. in color.
Other physical details online resource.
520 ## - SUMMARY, ETC.
Summary, etc. The four-volume set LNCS 14369 until 14372 constitutes the refereed proceedings of the 21st International Conference on Theory of Cryptography, TCC 2023, held in Taipei, Taiwan, in November/December 2023. The total of 68 full papers presented in the proceedings was carefully reviewed and selected from 168 submissions. They focus on topics such as proofs and outsourcing; theoretical foundations; multi-party computation; encryption; secret sharing, PIR and memory checking; anonymity, surveillance and tampering; lower bounds; IOPs and succinctness; lattices; quantum cryptography; Byzantine agreement, consensus and composability. .
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Communication Networks.
9 (RLIN) 40848
Topical term or geographic name entry element Computer networks
9 (RLIN) 40849
Topical term or geographic name entry element Computer networks .
9 (RLIN) 40849
Topical term or geographic name entry element Computer System Implementation.
9 (RLIN) 40850
Topical term or geographic name entry element Computer systems.
9 (RLIN) 40851
Topical term or geographic name entry element Cryptography.
9 (RLIN) 40852
Topical term or geographic name entry element Cryptology.
9 (RLIN) 40853
Topical term or geographic name entry element Data encryption (Computer science).
9 (RLIN) 40854
Topical term or geographic name entry element Data protection.
9 (RLIN) 40855
Topical term or geographic name entry element Data structures (Computer science).
9 (RLIN) 40856
Topical term or geographic name entry element Data Structures and Information Theory.
9 (RLIN) 40857
Topical term or geographic name entry element Information theory.
9 (RLIN) 40858
Topical term or geographic name entry element Mobile and Network Security.
9 (RLIN) 40859
Topical term or geographic name entry element Security Services.
9 (RLIN) 40860
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Rothblum, Guy.
9 (RLIN) 40861
Personal name Wee, Hoeteck.
9 (RLIN) 40862
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://doi.org/10.1007/978-3-031-48624-1">https://doi.org/10.1007/978-3-031-48624-1</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Book
Source of classification or shelving scheme Dewey Decimal Classification
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
        S. R. Ranganathan Learning Hub S. R. Ranganathan Learning Hub Online   Veda Library Solutions Pvt. Ltd., Noida   EB2968 2024-03-19 2024-03-19 e-Book Platform:Springer