Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cryptographic obfuscationa survey /
~
Buttyan, Levente.
Cryptographic obfuscationa survey /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Cryptographic obfuscationby Mate Horvath, Levente Buttyan.
Reminder of title:
a survey /
Author:
Horvath, Mate.
other author:
Buttyan, Levente.
Published:
Cham :Springer International Publishing :2020.
Description:
xxi, 107 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
Subject:
Data encryption (Computer science)
Online resource:
https://doi.org/10.1007/978-3-319-98041-6
ISBN:
9783319980416$q(electronic bk.)
Cryptographic obfuscationa survey /
Horvath, Mate.
Cryptographic obfuscation
a survey /[electronic resource] :by Mate Horvath, Levente Buttyan. - Cham :Springer International Publishing :2020. - xxi, 107 p. :ill., digital ;24 cm. - SpringerBriefs in computer science,2191-5768. - SpringerBriefs in computer science..
Introduction -- Background -- Definitional Approaches -- Bootstrapping: From the Seed to the Flower -- Building Core-Obfuscators: In Search of a Seed -- Building Functional Encryption: In Search of a Seed -- iO Combiners and Universal Constructions.
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
ISBN: 9783319980416$q(electronic bk.)
Standard No.: 10.1007/978-3-319-98041-6doiSubjects--Topical Terms:
184520
Data encryption (Computer science)
LC Class. No.: QA76.9.D335 / H67 2020
Dewey Class. No.: 005.82
Cryptographic obfuscationa survey /
LDR
:01540nmm a2200349 a 4500
001
585928
003
DE-He213
005
20201005132509.0
006
m d
007
cr nn 008maaau
008
210323s2020 sz s 0 eng d
020
$a
9783319980416$q(electronic bk.)
020
$a
9783319980409$q(paper)
024
7
$a
10.1007/978-3-319-98041-6
$2
doi
035
$a
978-3-319-98041-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.D335
$b
H67 2020
072
7
$a
GPJ
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
GPJ
$2
thema
072
7
$a
URY
$2
thema
082
0 4
$a
005.82
$2
23
090
$a
QA76.9.D335
$b
H823 2020
100
1
$a
Horvath, Mate.
$3
877191
245
1 0
$a
Cryptographic obfuscation
$h
[electronic resource] :
$b
a survey /
$c
by Mate Horvath, Levente Buttyan.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xxi, 107 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
SpringerBriefs in computer science,
$x
2191-5768
505
0
$a
Introduction -- Background -- Definitional Approaches -- Bootstrapping: From the Seed to the Flower -- Building Core-Obfuscators: In Search of a Seed -- Building Functional Encryption: In Search of a Seed -- iO Combiners and Universal Constructions.
520
$a
This book explains the development of cryptographic obfuscation, providing insight into the most important ideas and techniques. It will be a useful reference for researchers in cryptography and theoretical computer science.
650
0
$a
Data encryption (Computer science)
$3
184520
650
0
$a
Computer security.
$3
184416
650
1 4
$a
Cryptology.
$3
825728
650
2 4
$a
Systems and Data Security.
$3
274481
700
1
$a
Buttyan, Levente.
$3
280375
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
830
0
$a
SpringerBriefs in computer science.
$3
559641
856
4 0
$u
https://doi.org/10.1007/978-3-319-98041-6
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000189745
電子館藏
1圖書
電子書
EB QA76.9.D335 H823 2020 2020
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
https://doi.org/10.1007/978-3-319-98041-6
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login