Theory of Cryptography

14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016, Proceedings, Part I

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Theory of Cryptography by , Springer Berlin Heidelberg
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783662536414
Publisher: Springer Berlin Heidelberg Publication: October 21, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783662536414
Publisher: Springer Berlin Heidelberg
Publication: October 21, 2016
Imprint: Springer
Language: English

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.

The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

The two-volume set LNCS 9985 and LNCS 9986 constitutes the refereed proceedings of the 14th International Conference on Theory of Cryptography, TCC 2016-B, held in Beijing, China, in November 2016.

The total of 45 revised full papers presented in the proceedings were carefully reviewed and selected from 113 submissions. The papers were organized in topical sections named: TCC test-of-time award; foundations; unconditional security; foundations of multi-party protocols; round complexity and efficiency of multi-party computation; differential privacy; delegation and IP; public-key encryption; obfuscation and multilinear maps; attribute-based encryption; functional encryption; secret sharing; new models.

More books from Springer Berlin Heidelberg

Cover of the book Clinician's Guide to the Diagnosis and Management of Tooth Sensitivity by
Cover of the book Calcium Regulating Hormones, Vitamin D Metabolites, and Cyclic AMP Assays and Their Clinical Application by
Cover of the book Integrierte Schadenanalyse by
Cover of the book Chemistry and Biology of Solid Waste by
Cover of the book Plastic Surgery in the Sexually Handicapped by
Cover of the book Praktische Organisationsanalyse by
Cover of the book Alter und Altern by
Cover of the book Tutorium Mathe für Biologen by
Cover of the book Variations of the Welfare State by
Cover of the book Das Recht der Tierversuche unter Berücksichtigung unionsrechtlicher Vorgaben by
Cover of the book Unternehmensbewertung by
Cover of the book Waterlogging Signalling and Tolerance in Plants by
Cover of the book Shock, Sepsis, and Organ Failure by
Cover of the book The Right to Be Punished by
Cover of the book The Cerebral Perivascular Cells by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy