Applications of secure multiparty computation / / edited by Peeter Laud and Liina Kamm.

Saved in:
Bibliographic Details
Superior document:Cryptology and Information Security Series, Volume 13
TeilnehmendeR:
Place / Publishing House:Amsterdam, [The Netherlands] : : IOS Press,, 2015.
2015
Year of Publication:2015
Language:English
Series:Cryptology and information security series ; Volume 13.
Online Access:
Physical Description:1 online resource (254 pages) :; illustrations.
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5005161932
ctrlnum (MiAaPQ)5005161932
(Au-PeEL)EBL5161932
(CaPaEBR)ebr11473764
(OCoLC)919210530
collection bib_alma
record_format marc
spelling Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm.
Amsterdam, [The Netherlands] : IOS Press, 2015.
2015
1 online resource (254 pages) : illustrations.
text rdacontent
computer rdamedia
online resource rdacarrier
Cryptology and Information Security Series, 1871-6431 ; Volume 13
Includes bibliographical references and index.
Description based on print version record.
Electronic reproduction. Ann Arbor, MI : ProQuest, 2016. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
Data encryption (Computer science)
Computer security.
Electronic books.
Laud, Peeter, editor.
Kamm, Liina, editor.
Print version: Applications of secure multiparty computation. Amsterdam, [The Netherlands] : IOS Press, c2015 ix, 253 pages Cryptology and information security series ; Volume 13. 9781614995319 2015944406
ProQuest (Firm)
Cryptology and information security series ; Volume 13.
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5161932 Click to View
language English
format eBook
author2 Laud, Peeter,
Kamm, Liina,
author_facet Laud, Peeter,
Kamm, Liina,
author2_variant p l pl
l k lk
author2_role TeilnehmendeR
TeilnehmendeR
title Applications of secure multiparty computation /
spellingShingle Applications of secure multiparty computation /
Cryptology and Information Security Series,
title_full Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm.
title_fullStr Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm.
title_full_unstemmed Applications of secure multiparty computation / edited by Peeter Laud and Liina Kamm.
title_auth Applications of secure multiparty computation /
title_new Applications of secure multiparty computation /
title_sort applications of secure multiparty computation /
series Cryptology and Information Security Series,
series2 Cryptology and Information Security Series,
publisher IOS Press,
publishDate 2015
physical 1 online resource (254 pages) : illustrations.
isbn 9781614995326 (e-book)
9781614995319
issn 1871-6431 ;
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 A65 42015
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5161932
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8/2
dewey-sort 15.8 12
dewey-raw 005.8/2
dewey-search 005.8/2
oclc_num 919210530
work_keys_str_mv AT laudpeeter applicationsofsecuremultipartycomputation
AT kammliina applicationsofsecuremultipartycomputation
status_str n
ids_txt_mv (MiAaPQ)5005161932
(Au-PeEL)EBL5161932
(CaPaEBR)ebr11473764
(OCoLC)919210530
hierarchy_parent_title Cryptology and Information Security Series, Volume 13
hierarchy_sequence Volume 13.
is_hierarchy_title Applications of secure multiparty computation /
container_title Cryptology and Information Security Series, Volume 13
author2_original_writing_str_mv noLinkedField
noLinkedField
_version_ 1792330970065534976
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01904nam a2200445 i 4500</leader><controlfield tag="001">5005161932</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200923020339.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">171226t20152015ne a ob 001 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781614995319</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781614995326 (e-book)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5005161932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL5161932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr11473764</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)919210530</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.A65 2015</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Applications of secure multiparty computation /</subfield><subfield code="c">edited by Peeter Laud and Liina Kamm.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam, [The Netherlands] :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2015.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (254 pages) :</subfield><subfield code="b">illustrations.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and Information Security Series,</subfield><subfield code="x">1871-6431 ;</subfield><subfield code="v">Volume 13</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2016. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Laud, Peeter,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kamm, Liina,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Applications of secure multiparty computation.</subfield><subfield code="d">Amsterdam, [The Netherlands] : IOS Press, c2015 </subfield><subfield code="h">ix, 253 pages </subfield><subfield code="k">Cryptology and information security series ; Volume 13.</subfield><subfield code="z">9781614995319 </subfield><subfield code="w">2015944406</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">Volume 13.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=5161932</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>