Cryptography and coding 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings /
This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was...
Corporate Authors: | IMA International Conference Oxford, England) |
---|---|
Other Authors: | IMA International Conference, Groth, Jens,, SpringerLink (Online service) |
Format: | eBook |
Language: | English |
Published: |
[Cham] :
Springer,
[2015]
|
Physical Description: |
1 online resource (x, 328 pages). |
Series: |
Lecture notes in computer science ;
9496. LNCS sublibrary. Security and cryptology. |
Subjects: |
LEADER | 06387cam a2201333Mi 4500 | ||
---|---|---|---|
001 | 933755587 | ||
003 | OCoLC | ||
005 | 20240223121953.0 | ||
006 | m o d u | ||
007 | cr ||||||||||| | ||
008 | 160106s2015 sz o 100 0 eng d | ||
015 | |a GBB8J5518 |2 bnb | ||
016 | 7 | |a 019094188 |2 Uk | |
019 | |a 933784460 |a 961857422 |a 963293414 |a 964860129 |a 1005754980 |a 1011952114 |a 1027517147 |a 1048161575 |a 1058711975 |a 1066496734 |a 1081278236 |a 1086424392 |a 1110972500 |a 1112523278 | ||
020 | |a 9783319272399 |q (electronic book) | ||
020 | |a 331927239X |q (electronic book) | ||
020 | |z 9783319272382 |q (print) | ||
020 | |z 3319272381 |z 9783319272382 |q (print) | ||
024 | 7 | |a 10.1007/978-3-319-27239-9 |2 doi | |
035 | |a (OCoLC)933755587 |z (OCoLC)933784460 |z (OCoLC)961857422 |z (OCoLC)963293414 |z (OCoLC)964860129 |z (OCoLC)1005754980 |z (OCoLC)1011952114 |z (OCoLC)1027517147 |z (OCoLC)1048161575 |z (OCoLC)1058711975 |z (OCoLC)1066496734 |z (OCoLC)1081278236 |z (OCoLC)1086424392 |z (OCoLC)1110972500 |z (OCoLC)1112523278 | ||
037 | |a com.springer.onix.9783319272399 |b Springer Nature | ||
040 | |a NLGGC |b eng |e rda |e pn |c NLGGC |d DKDLA |d OCLCO |d YDXCP |d SFB |d NUI |d GW5XE |d OCLCO |d OCLCF |d OCLCO |d KSU |d IAO |d IAS |d JBG |d ICN |d IAD |d SOI |d VT2 |d ILO |d ESU |d IOG |d U3W |d OCLCA |d BUF |d OCLCQ |d AU@ |d UKMGB |d WYU |d EBLCP |d OCLCQ |d DCT |d ERF |d OCLCQ |d UKAHL |d COM |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
049 | |a COM6 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a URY |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8/2 |2 23 |
111 | 2 | |a IMA International Conference |n (15th : |d 2015 : |c Oxford, England) | |
245 | 1 | 0 | |a Cryptography and coding : |b 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015 : proceedings / |c Jens Groth (Ed.). |
264 | 1 | |a [Cham] : |b Springer, |c [2015] | |
264 | 4 | |c ©2015. | |
300 | |a 1 online resource (x, 328 pages). | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
347 | |a text file. | ||
347 | |b PDF. | ||
490 | 1 | |a Lectures notes in computer science ; |v 9496. | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology. | |
505 | 0 | |a Authentication -- Symmetric cryptography -- 2-party computation -- Codes -- Boolean functions -- Information theory -- Leakage resilience. | |
520 | |a This book constitutes the proceedings of the 15th IMA International Conference on Cryptography and Coding, IMACC 2015, held at Oxford, UK, in December 2015. The 18 papers presented together with 1 invited talk were carefully reviewed and selected from 36 submissions. The scope of the conference was on following topics: authentication, symmetric cryptography, 2-party computation, codes, Boolean functions, information theory, and leakage resilience. | ||
546 | |a English. | ||
650 | 0 | |a Data encryption (Computer science) |v Congresses. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Coding theory. | |
650 | 0 | |a Algorithms. | |
650 | 0 | |a Computer science |x Mathematics. | |
650 | 2 | |a Electronic Data Processing. | |
650 | 2 | |a Computer Security. | |
650 | 2 | |a Algorithms. | |
650 | 6 | |a Chiffrement (Informatique) |v Congrès. | |
650 | 6 | |a Informatique. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 6 | |a Algorithmes. | |
650 | 6 | |a Informatique |x Mathématiques. | |
650 | 7 | |a Coding theory & cryptology. |2 bicssc. | |
650 | 7 | |a Algorithms & data structures. |2 bicssc. | |
650 | 7 | |a Computer security. |2 bicssc. | |
650 | 7 | |a Discrete mathematics. |2 bicssc. | |
650 | 7 | |a Data encryption. |2 bicssc. | |
650 | 7 | |a Computers |x Information Theory. |2 bisacsh. | |
650 | 7 | |a Computers |x Programming |x Algorithms. |2 bisacsh. | |
650 | 7 | |a Computers |x Security |x General. |2 bisacsh. | |
650 | 7 | |a algorithms. |2 aat. | |
650 | 7 | |a Computers |x Data Processing. |2 bisacsh. | |
650 | 7 | |a Algorithms. |2 fast. | |
650 | 7 | |a Coding theory. |2 fast. | |
650 | 7 | |a Computer science. |2 fast. | |
650 | 7 | |a Computer science |x Mathematics. |2 fast. | |
650 | 7 | |a Computer security. |2 fast. | |
650 | 7 | |a Data encryption (Computer science) |2 fast. | |
655 | 2 | |a Congress. | |
655 | 7 | |a proceedings (reports) |2 aat. | |
655 | 7 | |a Conference papers and proceedings. |2 fast. | |
655 | 7 | |a Conference papers and proceedings. |2 lcgft. | |
655 | 7 | |a Actes de congrès. |2 rvmgf. | |
700 | 1 | |a Groth, Jens, |e editor. | |
710 | 2 | |a SpringerLink (Online service) | |
776 | 0 | 8 | |i Print version: |a IMA International Conference (15th : 2015 : Oxford, England). |t Cryptography and coding. |d [Cham] : Springer, [2015] |z 3319272381 |z 9783319272382 |w (OCoLC)927376085. |
830 | 0 | |a Lecture notes in computer science ; |v 9496. |x 1611-3349. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
907 | |a .b50281483 |b multi |c - |d 160404 |e 240320 | ||
998 | |a (3)cue |a cu |b 240227 |c m |d z |e - |f eng |g sz |h 0 |i 2 | ||
948 | |a MARCIVE Overnight, in 2024.03 | ||
948 | |a MARCIVE Comp, in 2023.01 | ||
948 | |a MARCIVE Over, 07/2021 | ||
948 | |a MARCIVE Comp, 2019.05 | ||
948 | |a MARCIVE Q2, 2018 | ||
948 | |a MARCIVE Comp, 2018.05 | ||
948 | |a MARCIVE Comp, 2017.10 | ||
948 | |a MARCIVE August, 2017 | ||
948 | |a MARCIVE extract Aug 5, 2017 | ||
994 | |a 92 |b COM | ||
995 | |a Loaded with m2btab.ltiac in 2024.03 | ||
995 | |a Loaded with m2btab.elec in 2024.02 | ||
995 | |a Loaded with m2btab.ltiac in 2023.01 | ||
995 | |a Loaded with m2btab.ltiac in 2021.07 | ||
995 | |a Loaded with m2btab.elec in 2021.06 | ||
995 | |a Loaded with m2btab.ltiac in 2019.05 | ||
995 | |a Loaded with m2btab.ltiac in 2018.08 | ||
995 | |a Loaded with m2btab.ltiac in 2018.06 | ||
995 | 0 | 0 | |a OCLC offline update by CMU and loaded with m2btab.elec in 2018.04 |
995 | |a Loaded with m2btab.ltiac in 2017.10 | ||
995 | |a Loaded with m2btab.ltiac in 2017.09 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a Loaded with m2btab.elec in 2016 | ||
995 | |a OCLC offline update by CMU | ||
999 | |e z | ||
999 | |a cue | ||
989 | |d cueme |e - - |f - - |g - |h 0 |i 0 |j 200 |k 240227 |l $0.00 |m |n - - |o - |p 0 |q 0 |t 0 |x 0 |w SpringerLink |1 .i150447085 |u http://ezproxy.coloradomesa.edu/login?url=https://link.springer.com/10.1007/978-3-319-27239-9 |3 SpringerLink |z Click here for access |