Public Key Cryptography – PKC 2010 (Registro nro. 202270)

MARC details
000 -LÍDER
fixed length control field 05971nam a22005535i 4500
001 - NÚMERO DE CONTROL
control field u374390
003 - IDENTIFICADOR DEL NÚMERO DE CONTROL
control field SIRSI
005 - FECHA Y HORA DE LA ULTIMA TRANSACCIÓN
control field 20160812084232.0
007 - CAMPO FIJO DE DESCRIPCIÓN FIJA--INFORMACIÓN GENERAL
fixed length control field cr nn 008mamaa
008 - ELEMENTOS DE LONGITUD FIJA -- INFORMACIÓN GENERAL
fixed length control field 100514s2010 gw | s |||| 0|eng d
020 ## - NÚMERO INTERNACIONAL NORMALIZADO PARA LIBROS
International Standard Book Number 9783642130137
-- 978-3-642-13013-7
040 ## - FUENTE DE CATALOGACIÓN
Transcribing agency MX-MeUAM
050 #4 - SIGNATURA TOPOGRÁFICA DE LA BIBLIOTECA DEL CONGRESO
Classification number TK5105.5-5105.9
082 04 - NÚMERO DE CLASIFICACIÓN DECIMAL DEWEY
Classification number 004.6
Edition number 23
100 1# - ASIENTO PRINCIPAL--NOMBRE PERSONAL
Personal name Nguyen, Phong Q.
Relator term editor.
245 10 - MENCIÓN DE TITULO
Title Public Key Cryptography – PKC 2010
Medium [recurso electrónico] :
Remainder of title 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings /
Statement of responsibility, etc. edited by Phong Q. Nguyen, David Pointcheval.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Berlin, Heidelberg :
Name of producer, publisher, distributor, manufacturer Springer Berlin Heidelberg,
Date of production, publication, distribution, manufacture, or copyright notice 2010.
300 ## - DESCRIPCIÓN FÍSICA
Extent XIII, 519p. 34 illus.
Other physical details online resource.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
347 ## - DIGITAL FILE CHARACTERISTICS
File type text file
Encoding format PDF
Source rda
490 1# - MENCIÓN DE SERIE
Series statement Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume/sequential designation 6056
505 0# - NOTA DE CONTENIDO
Formatted contents note Encryption I -- Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model -- Constant Size Ciphertexts in Threshold Attribute-Based Encryption -- Cryptanalysis -- Algebraic Cryptanalysis of the PKC’2009 Algebraic Surface Cryptosystem -- Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA -- Implicit Factoring with Shared Most Significant and Middle Bits -- Protocols I -- On the Feasibility of Consistent Computations -- Multi-query Computationally-Private Information Retrieval with Constant Communication Rate -- Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting -- Network Coding -- Secure Network Coding over the Integers -- Preventing Pollution Attacks in Multi-source Network Coding -- Tools -- Groth–Sahai Proofs Revisited -- Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments -- Elliptic Curves -- Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions -- Faster Pairing Computations on Curves with High-Degree Twists -- Efficient Arithmetic on Hessian Curves -- Lossy Trapdoor Functions -- CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model -- More Constructions of Lossy and Correlation-Secure Trapdoor Functions -- Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions -- Protocols II -- Efficient Set Operations in the Presence of Malicious Adversaries -- Text Search Protocols with Simulation Based Security -- Discrete Logarithm -- Solving a 676-Bit Discrete Logarithm Problem in GF(36n ) -- Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval -- Encryption II -- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation -- Security of Encryption Schemes in Weakened Random Oracle Models -- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes -- Signatures -- Unlinkability of Sanitizable Signatures -- Confidential Signatures and Deterministic Signcryption -- Identity-Based Aggregate and Multi-Signature Schemes Based on RSA -- Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More.
520 ## - NOTA DE RESUMEN, ETC.
Summary, etc. The 13th International Conference on Practice and Theory in Public Key Cryp- ´ tography(PKC2010)washeldMay26–28,2010,attheEcoleNormaleSup´ erieure (ENS) in Paris, France. PKC 2010 was sponsored by the International Associ- ´ ation for Cryptologic Research (IACR), in cooperation with the Ecole Normale Sup´ erieure (ENS) and the Institut National de Recherche en Informatique et en Automatique (INRIA). The General Chairs of the conference were Michel Abdalla and Pierre-Alain Fouque. The conference received a record number of 145 submissions and each s- missionwas assignedto at least 3 committee members. Submissions co-authored by members of the Program Committee were assigned to at least ?ve comm- tee members. Due to the large number of high-quality submissions, the review process was challenging and we are deeply grateful to the 34 committee m- bers and the 163 external reviewers for their outstanding work. After extensive discussions, the Program Committee selected 29 submissions for presentation during the conference and these are the articles that are included in this v- ume. The best paper was awardedto Petros Mol and Scott Yilek for their paper “Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions. ” The - view process was run using the iChair software, written by Thomas Baign` eres and Matthieu Finiasz from EPFL, LASEC, Switzerland, and we are indebted to them for letting us use their software. The program also included two invited talks: it was a great honor to have Daniele Micciancio and Jacques Stern as invited speakers.
596 ## -
-- 19
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer science.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Communication Networks.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data protection.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data encryption (Computer science).
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer software.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computational complexity.
650 #0 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Information Systems.
650 14 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Science.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Computer Communication Networks.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Data Encryption.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Management of Computing and Information Systems.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Algorithm Analysis and Problem Complexity.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Systems and Data Security.
650 24 - ASIENTO SECUNDARIO DE MATERIA - TERMINO TEMÁTICO
Topical term or geographic name as entry element Discrete Mathematics in Computer Science.
700 1# - ASIENTO SECUNDARIO - NOMBRE PERSONAL
Personal name Pointcheval, David.
Relator term editor.
710 2# - ASIENTO SECUNDARIO - NOMBRE CORPORATIVO
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Printed edition:
International Standard Book Number 9783642130120
830 #0 - ASIENTO SECUNDARIO DE SERIE--TITULO UNIFORME
Uniform title Lecture Notes in Computer Science,
International Standard Serial Number 0302-9743 ;
Volume number/sequential designation 6056
856 40 - LOCALIZACIÓN Y ACCESO ELECTRÓNICOS
Public note Libro electrónico
Uniform Resource Identifier <a href="http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-13013-7">http://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-13013-7</a>
942 ## - TIPO DE MATERIAL (KOHA)
Koha item type Libro Electrónico
Existencias
Estado de retiro Fuente de clasificación Colección Ubicación permanente Ubicación actual Fecha de ingreso Total Checkouts Signatura topográfica Código de barras Date last seen Número de copia Tipo de material
    Colección de Libros Electrónicos Biblioteca Electrónica Biblioteca Electrónica     TK5105.5 -5105.9 374390-2001 12/08/2016 1 Libro Electrónico

Con tecnología Koha