Applications of secure multiparty computation / / edited by Peeter Laud and Liina Kamm.
Saved in:
Superior document: | Cryptology and Information Security Series, Volume 13 |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Amsterdam, [The Netherlands] : : IOS Press,, 2015. 2015 |
Year of Publication: | 2015 |
Language: | English |
Series: | Cryptology and information security series ;
Volume 13. |
Online Access: | |
Physical Description: | 1 online resource (254 pages) :; illustrations. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
5005161932 |
---|---|
ctrlnum |
(MiAaPQ)5005161932 (Au-PeEL)EBL5161932 (CaPaEBR)ebr11473764 (OCoLC)919210530 |
collection |
bib_alma |
record_format |
marc |
spelling |
Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm. Amsterdam, [The Netherlands] : IOS Press, 2015. 2015 1 online resource (254 pages) : illustrations. text rdacontent computer rdamedia online resource rdacarrier Cryptology and Information Security Series, 1871-6431 ; Volume 13 Includes bibliographical references and index. Description based on print version record. Electronic reproduction. Ann Arbor, MI : ProQuest, 2016. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Data encryption (Computer science) Computer security. Electronic books. Laud, Peeter, editor. Kamm, Liina, editor. Print version: Applications of secure multiparty computation. Amsterdam, [The Netherlands] : IOS Press, c2015 ix, 253 pages Cryptology and information security series ; Volume 13. 9781614995319 2015944406 ProQuest (Firm) Cryptology and information security series ; Volume 13. https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5161932 Click to View |
language |
English |
format |
eBook |
author2 |
Laud, Peeter, Kamm, Liina, |
author_facet |
Laud, Peeter, Kamm, Liina, |
author2_variant |
p l pl l k lk |
author2_role |
TeilnehmendeR TeilnehmendeR |
title |
Applications of secure multiparty computation / |
spellingShingle |
Applications of secure multiparty computation / Cryptology and Information Security Series, |
title_full |
Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm. |
title_fullStr |
Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm. |
title_full_unstemmed |
Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm. |
title_auth |
Applications of secure multiparty computation / |
title_new |
Applications of secure multiparty computation / |
title_sort |
applications of secure multiparty computation / |
series |
Cryptology and Information Security Series, |
series2 |
Cryptology and Information Security Series, |
publisher |
IOS Press, |
publishDate |
2015 |
physical |
1 online resource (254 pages) : illustrations. |
isbn |
9781614995326 (e-book) 9781614995319 |
issn |
1871-6431 ; |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 A65 42015 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5161932 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8/2 |
dewey-sort |
15.8 12 |
dewey-raw |
005.8/2 |
dewey-search |
005.8/2 |
oclc_num |
919210530 |
work_keys_str_mv |
AT laudpeeter applicationsofsecuremultipartycomputation AT kammliina applicationsofsecuremultipartycomputation |
status_str |
n |
ids_txt_mv |
(MiAaPQ)5005161932 (Au-PeEL)EBL5161932 (CaPaEBR)ebr11473764 (OCoLC)919210530 |
hierarchy_parent_title |
Cryptology and Information Security Series, Volume 13 |
hierarchy_sequence |
Volume 13. |
is_hierarchy_title |
Applications of secure multiparty computation / |
container_title |
Cryptology and Information Security Series, Volume 13 |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1792330970065534976 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01904nam a2200445 i 4500</leader><controlfield tag="001">5005161932</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200923020339.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">171226t20152015ne a ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614995319</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614995326 (e-book)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5005161932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL5161932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr11473764</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)919210530</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.A65 2015</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Applications of secure multiparty computation /</subfield><subfield code="c">edited by Peeter Laud and Liina Kamm.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam, [The Netherlands] :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (254 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and Information Security Series,</subfield><subfield code="x">1871-6431 ;</subfield><subfield code="v">Volume 13</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2016. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Laud, Peeter,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kamm, Liina,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Applications of secure multiparty computation.</subfield><subfield code="d">Amsterdam, [The Netherlands] : IOS Press, c2015 </subfield><subfield code="h">ix, 253 pages </subfield><subfield code="k">Cryptology and information security series ; Volume 13.</subfield><subfield code="z">9781614995319 </subfield><subfield code="w">2015944406</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">Volume 13.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5161932</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |