Listing 1 - 2 of 2 |
Sort by
|
Choose an application
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.
Computer Science. --- Data Encryption. --- Systems and Data Security. --- Computation by Abstract Devices. --- Algorithm Analysis and Problem Complexity. --- Discrete Mathematics in Computer Science. --- Computer science. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Computational complexity. --- Informatique --- Protection de l'information (Informatique) --- Chiffrement (Informatique) --- Logiciels --- Complexité de calcul (Informatique) --- Engineering & Applied Sciences --- Computer Science --- Computer security. --- Computers. --- Algorithms. --- Computer science --- Mathematics. --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Algorism --- Algebra --- Arithmetic --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Mathematics --- Foundations --- Protection --- Security measures --- Cryptology. --- Complexity, Computational --- Software, Computer --- Computer science—Mathematics.
Choose an application
The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.
Complex analysis --- Discrete mathematics --- Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- cryptografie --- discrete wiskunde --- complexe analyse (wiskunde) --- computers --- informatica --- externe fixatie (geneeskunde --- algoritmen --- computerbeveiliging
Listing 1 - 2 of 2 |
Sort by
|