Applications of secure multiparty computation /
Saved in:
Imprint: | Amsterdam : IOS Press, 2015. |
---|---|
Description: | 1 online resource |
Language: | English |
Series: | Cryptology and information security series ; volume 13 Cryptology and information security series ; volume 13. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11405249 |
MARC
LEADER | 00000cam a2200000Ii 4500 | ||
---|---|---|---|
001 | 11405249 | ||
005 | 20220624111547.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 150826s2015 ne ob 001 0 eng d | ||
010 | |a 2015944406 | ||
019 | |a 982228298 |a 1048192252 |a 1066630948 |a 1097136792 |a 1235825714 |a 1272923207 | ||
020 | |a 9781614995326 |q (electronic bk.) | ||
020 | |a 161499532X |q (electronic bk.) | ||
020 | |z 9781614995319 | ||
020 | |z 1614995311 | ||
035 | |a (OCoLC)919210530 |z (OCoLC)982228298 |z (OCoLC)1048192252 |z (OCoLC)1066630948 |z (OCoLC)1097136792 |z (OCoLC)1235825714 |z (OCoLC)1272923207 | ||
035 | 9 | |a (OCLCCM-CC)919210530 | |
037 | |a 9781614995326 |b IOS Press |n http://www.iospress.nl | ||
040 | |a IOSPR |b eng |e rda |e pn |c IOSPR |d OCLCO |d OCLCF |d NLGGC |d S4S |d OCLCQ |d YDX |d IDEBK |d EBLCP |d N$T |d SNK |d DKU |d AUW |d IGB |d D6H |d VTS |d N$T |d EZ9 |d VT2 |d AGLDB |d OCLCQ |d G3B |d WYU |d S8J |d S9I |d CUS |d STF |d M8D |d OCLCQ |d OCLCO | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
245 | 0 | 0 | |a Applications of secure multiparty computation / |c edited by Peeter Laud and Liina Kamm. |
264 | 1 | |a Amsterdam : |b IOS Press, |c 2015. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Cryptology and information security series ; |v volume 13 | |
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed January 26, 2018). | |
504 | |a Includes bibliographical references and index. | ||
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a Data encryption (Computer science) |2 fast |0 (OCoLC)fst00887935 | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Laud, Peeter, |e editor. |0 http://id.loc.gov/authorities/names/nb2012012745 | |
700 | 1 | |a Kamm, Liina, |e editor. |0 http://id.loc.gov/authorities/names/no2016012567 | |
710 | 2 | |a IOS Press, |e publisher. |0 http://id.loc.gov/authorities/names/no2015091156 | |
776 | 0 | 8 | |i Print version: |t Applications of secure multiparty computation. |d Amsterdam, [The Netherlands] : IOS Press, ©2015 |h ix, 253 pages |k Cryptology and information security series ; Volume 13 |x 1871-6431 |z 9781614995319 |
830 | 0 | |a Cryptology and information security series ; |v volume 13. |0 http://id.loc.gov/authorities/names/no2008086431 | |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=1640453 |y eBooks on EBSCOhost |
856 | 4 | 0 | |u https://directory.doabooks.org/handle/20.500.12854/41078 |y Open Access Publishing in European Networks |
901 | |a OpenAccess | ||
903 | |a HeVa | ||
929 | |a oclccm | ||
999 | f | f | |i 3cffb74c-373e-59ce-8a34-c5457c37347e |s b85e1bfd-4a82-54ce-83e8-06d5978db503 |
928 | |t Library of Congress classification |a QA76.9.A25 |l Online |c UC-FullText |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=1640453 |z eBooks on EBSCOhost |u https://directory.doabooks.org/handle/20.500.12854/41078 |z Open Access Publishing in European Networks |g ebooks |i 12429071 |