Theory of cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: Theory of Cryptography Conference Peking (VerfasserIn)
Weitere Verfasser: Hirt, Martin (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Berlin, Heidelberg Springer [2016]
Schriftenreihe:Lecture Notes in Computer Science 9985
Schlagworte:
Online-Zugang:DE-634
DE-Aug4
DE-573
DE-M347
DE-92
DE-898
DE-859
DE-861
DE-523
DE-91
DE-384
DE-473
DE-19
DE-355
DE-703
DE-20
DE-706
DE-29
DE-739
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zcb4500
001 BV043857581
003 DE-604
005 20161115
007 cr|uuu---uuuuu
008 161103s2016 xx a||| o|||| 10||| eng d
020 |a 9783662536414  |c Online  |9 978-3-662-53641-4 
020 |a 9783662536407  |c Print  |9 978-3-662-53640-7 
024 7 |a 10.1007/978-3-662-53641-4  |2 doi 
035 |a (ZDB-2-SCS)9783662536414 
035 |a (ZDB-2-LNC)9783662536414 
035 |a (OCoLC)962103111 
035 |a (DE-599)BVBBV043857581 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-706  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-20  |a DE-92  |a DE-384  |a DE-573  |a DE-M347  |a DE-703  |a DE-739  |a DE-634  |a DE-355 
082 0 |a 005.82  |2 23 
084 |a DAT 000  |2 stub 
084 |a DAT 465f  |2 stub 
111 2 |a Theory of Cryptography Conference  |n 14.  |d 2016  |c Peking  |j Verfasser  |0 (DE-588)1118634454  |4 aut 
245 1 0 |a Theory of cryptography  |b 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I  |c edited by Martin Hirt, Adam Smith 
264 1 |a Berlin, Heidelberg  |b Springer  |c [2016] 
264 4 |c © 2016 
300 |a 1 Online-Ressource XVI, 692 Seiten  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v Volume 9985  |x 0302-9743 
650 4 |a Computer science 
650 4 |a Computer communication systems 
650 4 |a Computer security 
650 4 |a Data encryption (Computer science) 
650 4 |a Algorithms 
650 4 |a Computer science / Mathematics 
650 4 |a Management information systems 
650 4 |a Computer Science 
650 4 |a Data Encryption 
650 4 |a Systems and Data Security 
650 4 |a Algorithm Analysis and Problem Complexity 
650 4 |a Discrete Mathematics in Computer Science 
650 4 |a Management of Computing and Information Systems 
650 4 |a Computer Communication Networks 
650 4 |a Informatik 
650 4 |a Mathematik 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2016  |z Peking  |2 gnd-content 
689 0 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 |5 DE-604 
700 1 |a Hirt, Martin  |4 edt 
830 0 |a Lecture Notes in Computer Science  |v 9985  |w (DE-604)BV014880109  |9 9985 
856 4 0 |u https://doi.org/10.1007/978-3-662-53641-4  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2016 
943 1 |a oai:aleph.bib-bvb.de:BVB01-029267757 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-634  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-Aug4  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-573  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-M347  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-92  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-898  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-859  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-861  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-523  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-91  |p ZDB-2-LNC  |q ZDB-2-LNC_2016  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-384  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-473  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-19  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-355  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-703  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-20  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-706  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-29  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-662-53641-4  |l DE-739  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-TUM_katkey 2236598
DE-BY-UBM_katkey 5352011
DE-BY-UBM_local_url https://doi.org/10.1007/978-3-662-53641-4
Verlag
DE-BY-UBR_katkey 5802720
_version_ 1823056061591977984
any_adam_object
author2 Hirt, Martin
author2_role edt
author2_variant m h mh
author_corporate Theory of Cryptography Conference Peking
author_corporate_role aut
author_facet Hirt, Martin
Theory of Cryptography Conference Peking
author_sort Theory of Cryptography Conference Peking
building Verbundindex
bvnumber BV043857581
classification_tum DAT 000
DAT 465f
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783662536414
(ZDB-2-LNC)9783662536414
(OCoLC)962103111
(DE-599)BVBBV043857581
dewey-full 005.82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000 - Computer science, information, general works
discipline Informatik
doi_str_mv 10.1007/978-3-662-53641-4
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04474nam a2200901zcb4500</leader><controlfield tag="001">BV043857581</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161115 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">161103s2016 xx a||| o|||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662536414</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-662-53641-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783662536407</subfield><subfield code="c">Print</subfield><subfield code="9">978-3-662-53640-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-662-53641-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783662536414</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783662536414</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)962103111</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043857581</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Theory of Cryptography Conference</subfield><subfield code="n">14.</subfield><subfield code="d">2016</subfield><subfield code="c">Peking</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1118634454</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Theory of cryptography</subfield><subfield code="b">14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I</subfield><subfield code="c">edited by Martin Hirt, Adam Smith</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin, Heidelberg</subfield><subfield code="b">Springer</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource XVI, 692 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">Volume 9985</subfield><subfield code="x">0302-9743</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer communication systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithms</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science / Mathematics</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithm Analysis and Problem Complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Discrete Mathematics in Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management of Computing and Information Systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mathematik</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2016</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hirt, Martin</subfield><subfield code="4">edt</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture Notes in Computer Science</subfield><subfield code="v">9985</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">9985</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2016</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029267757</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-634</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-Aug4</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-M347</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-92</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-859</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-861</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-523</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2016</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-384</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-473</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-19</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-355</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-703</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-29</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-662-53641-4</subfield><subfield code="l">DE-739</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2016 Peking gnd-content
genre_facet Konferenzschrift 2016 Peking
id DE-604.BV043857581
illustrated Illustrated
indexdate 2025-02-03T17:41:49Z
institution BVB
institution_GND (DE-588)1118634454
isbn 9783662536414
9783662536407
issn 0302-9743
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029267757
oclc_num 962103111
open_access_boolean
owner DE-706
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-20
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-739
DE-634
DE-355
DE-BY-UBR
owner_facet DE-706
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-20
DE-92
DE-384
DE-573
DE-M347
DE-703
DE-739
DE-634
DE-355
DE-BY-UBR
physical 1 Online-Ressource XVI, 692 Seiten Illustrationen, Diagramme
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2016
ZDB-2-LNC ZDB-2-LNC_2016
publishDate 2016
publishDateSearch 2016
publishDateSort 2016
publisher Springer
record_format marc
series Lecture Notes in Computer Science
series2 Lecture Notes in Computer Science
spellingShingle Theory of cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I
Lecture Notes in Computer Science
Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computer science / Mathematics
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
Computer Communication Networks
Informatik
Mathematik
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4033329-2
(DE-588)1071861417
title Theory of cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I
title_auth Theory of cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I
title_exact_search Theory of cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I
title_full Theory of cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I edited by Martin Hirt, Adam Smith
title_fullStr Theory of cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I edited by Martin Hirt, Adam Smith
title_full_unstemmed Theory of cryptography 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I edited by Martin Hirt, Adam Smith
title_short Theory of cryptography
title_sort theory of cryptography 14th international conference tcc 2016 b beijing china october 31 november 3 2016 proceedings part i
title_sub 14th International Conference, TCC 2016-B, Beijing, China, October 31-November 3, 2016 : proceedings, part I
topic Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computer science / Mathematics
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
Computer Communication Networks
Informatik
Mathematik
Kryptologie (DE-588)4033329-2 gnd
topic_facet Computer science
Computer communication systems
Computer security
Data encryption (Computer science)
Algorithms
Computer science / Mathematics
Management information systems
Computer Science
Data Encryption
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
Computer Communication Networks
Informatik
Mathematik
Kryptologie
Konferenzschrift 2016 Peking
url https://doi.org/10.1007/978-3-662-53641-4
volume_link (DE-604)BV014880109
work_keys_str_mv AT theoryofcryptographyconferencepeking theoryofcryptography14thinternationalconferencetcc2016bbeijingchinaoctober31november32016proceedingsparti
AT hirtmartin theoryofcryptography14thinternationalconferencetcc2016bbeijingchinaoctober31november32016proceedingsparti