Staff View for: Theory of cryptography : 16th Internatio

 Staff view

You must be logged in to Tag Records

Theory of cryptography : 16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings. Part II /

edited by Amos Beimel, Stefan Dziembowski.

Book Cover
Names: Beimel, Amos, | Dziembowski, Stefan,
Published: Cham, Switzerland : Springer, 2018.
Series: Lecture notes in computer science ; 11240.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Data encryption (Computer science) - Congresses.
Genres: Electronic books.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 02013nam a2200469Ii 4500
001 18149900
005 20181211215450.0
006 m o d
007 cr cnu|||unuuu
008 181120s2018 sz a o 101 0 eng d
020 |a9783030038106|q(electronic bk.)
020 |a3030038106|q(electronic bk.)
020 |z9783030038090|q(print)
024 7 |a10.1007/978-3-030-03810-6|2doi
035 |a(OCoLC)on1066344355
035 |a(UIUdb)8843456
040 |aGW5XE|beng|erda|epn|cGW5XE|dUIU|dUIUdb
049 |aUIUU|oskip
050 4|aQA76.9.A25
082 04|a005.8/24|223
111 2 |aTheory of Cryptography Conference|n(16th :|d2018 :|cPanaji, India)
245 10|aTheory of cryptography :|b16th International Conference, TCC 2018, Panaji, India, November 11-14, 2018, Proceedings.|nPart II /|cedited by Amos Beimel, Stefan Dziembowski.
246 3 |aTCC 2018
264 1|aCham, Switzerland :|bSpringer,|c2018.
300 |a1 online resource (xvii, 732 pages) :|billustrations (some color).
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
490 1 |aLecture notes in computer science ;|v11240
490 1 |aLNCS sublibrary. SL 4, Security and cryptology
500 |aInternational conference proceedings.
500 |aIncludes author index.
588 0 |aOnline resource; title from PDF title page (SpringerLink, viewed November 20, 2018).
650 0|aData encryption (Computer science)|vCongresses.
655 4|aElectronic books.
700 1 |aBeimel, Amos,|eeditor.
700 1 |aDziembowski, Stefan,|eeditor.
830 0|aLecture notes in computer science ;|v11240.
830 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology.
852 8 |beresour-nc|hOnline Resource|t1|zAccessible anywhere on campus or with UIUC NetID
856 40|3SpringerLink - Full text online|uhttp://www.library.illinois.edu/proxy/go.php?url=http://doi.org/10.1007/978-3-030-03810-6
994 |aC0|bUIU

Staff View for: Theory of cryptography : 16th Internatio