賣家於 10月10日 (星期五) 09:06 結束刊登物品,因為物品已不再有售。
Theory of Cryptography Fifth Theory of Cryptography Conference TCC 2008 Springer
已結束
Theory of Cryptography Fifth Theory of Cryptography Conference TCC 2008 Springer
US $64.85US $64.85
10-10 五, 21 小時 06 分 54 秒10-10 五, 21 小時 06 分 54 秒

Theory of Cryptography Fifth Theory of Cryptography Conference TCC 2008 Springer

US $64.85
大約HK$ 504.68
或講價
狀況:
很好
A copy that has been read but remains in clean condition. All pages are intact, and the cover is ... 閱讀更多內容關於物品狀況
    運送:
    US $9.80(大約 HK$ 76.27) Economy Shipping from outside US.
    所在地:Tel Aviv, 以色列
    送達日期:
    估計於 11月5日 (星期三)12月9日 (星期二)之間送達 運送地點 94104
    估計送達日期 — 會在新視窗或分頁中開啟考慮到賣家的處理時間、寄出地郵遞區碼、目的地郵遞區碼、接收包裹時間,並取決於所選的運送方式以及收到全部款項全部款項 — 會在新視窗或分頁中開啟的時間。送達時間會因時而異,尤其是節日。
    退貨:
    30 日退貨. 由買家支付退貨運費,如果你使用 eBay 郵寄標籤,相關費用將從你的退款金額中扣除.
    保障:
    請參閱物品說明或聯絡賣家以取得詳細資料。閱覽全部詳情查看保障詳情
    (不符合「eBay 買家保障方案」資格)
    賣家必須承擔此刊登物品的所有責任。
    eBay 物品編號:135683077195

    物品細節

    物品狀況
    很好
    曾被閱讀過的書籍,但狀況良好。封面不存在明顯損壞,精裝本書籍含書皮。不存在缺頁或內頁受損,無褶皺或破損,同時也沒有對文字標注/標記,或在留白處書寫內容。內封面上標記可能極少。書籍的磨損和破損程度也很低。 查看所有物品狀況定義會在新視窗或分頁中開啟
    賣家備註
    “A copy that has been read but remains in clean condition. All pages are intact, and the cover is ...
    Educational Level
    Adult & Further Education
    Features
    Conference Publication
    Item Height
    235mm
    Level
    Intermediate, Advanced, Proficiency, Technical
    Personalised
    No
    ISBN
    9783540785231
    類別

    關於產品

    Product Identifiers

    Publisher
    Springer Berlin / Heidelberg
    ISBN-10
    354078523X
    ISBN-13
    9783540785231
    eBay Product ID (ePID)
    9038398123

    Product Key Features

    Number of Pages
    Xii, 645 Pages
    Language
    English
    Publication Name
    Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008, Proceedings
    Publication Year
    2008
    Subject
    Programming / Algorithms, Communication Studies, Security / Cryptography, Computer Science, Security / General
    Type
    Textbook
    Subject Area
    Computers, Language Arts & Disciplines
    Author
    Ran Canetti
    Series
    Lecture Notes in Computer Science Ser.
    Format
    Trade Paperback

    Dimensions

    Item Weight
    35.4 Oz
    Item Length
    9.3 in
    Item Width
    6.1 in

    Additional Product Features

    Intended Audience
    Scholarly & Professional
    Series Volume Number
    4948
    Number of Volumes
    1 vol.
    Illustrated
    Yes
    Table Of Content
    Technical Session 1.- Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency.- On Seed-Incompressible Functions.- Technical Session 2.- Asymptotically Efficient Lattice-Based Digital Signatures.- Basing Weak Public-Key Cryptography on Strong One-Way Functions.- Technical Session 3.- Which Languages Have 4-Round Zero-Knowledge Proofs?.- How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge.- General Properties of Quantum Zero-Knowledge Proofs.- Technical Session 4.- The Layered Games Framework for Specifications and Analysis of Security Protocols.- Universally Composable Multi-party Computation with an Unreliable Common Reference String.- Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries.- Fast Private Norm Estimation and Heavy Hitters.- Technical Session 5.- Matroids Can Be Far from Ideal Secret Sharing.- Perfectly-Secure MPC with Linear Communication Complexity.- MPC vs. SFE: Perfect Security in a Unified Corruption Model.- Invited Talk.- Bridging Game Theory and Cryptography: Recent Results and Future Directions.- Technical Session 6.- Verifiably Secure Devices.- Lower Bounds on Implementing Robust and Resilient Mediators.- Cryptography and Game Theory: Designing Protocols for Exchanging Information.- Technical Session 7.- Equivocal Blind Signatures and Adaptive UC-Security.- P-signatures and Noninteractive Anonymous Credentials.- Technical Session 8.- Multi-property Preserving Combiners for Hash Functions.- OT-Combiners via Secure Computation.- Semi-honest to Malicious Oblivious Transfer--The Black-Box Way.- Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.- Technical Session 9.-A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval.- Randomness Extraction Via ?-Biased Masking in the Presence of a Quantum Attacker.- Technical Session 10.- An Equivalence Between Zero Knowledge and Commitments.- Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model.- Technical Session 11.- The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization.- On Constant-Round Concurrent Zero-Knowledge.- Technical Session 12.- Concurrent Non-malleable Commitments from Any One-Way Function.- Faster and Shorter Password-Authenticated Key Exchange.- Technical Session 13.- Saving Private Randomness in One-Way Functions and Pseudorandom Generators.- Degradation and Amplification of Computational Hardness.
    Synopsis
    TCC 2008, the 5th Theory of Cryptography Conference, was held in New York, New York, March 19-21, 2008, at New York University. TCC 2008 was sp- soredbytheInternationalAssociationforCryptologicResearch(IACR)andwas organizedincooperationwiththeDepartmentofComputerScienceatNewYork University and the Courant Institute for Mathematical Sciences. The General Chairs of the conference were Yevgeniy Dodis and Victor Shoup. The conference received 81 submissions, of which the Program Committee selected34forpresentationattheconference.Theauthorsoftwopapersthen- cidedto mergetheir papers, resulting in a totalof33 presentedpapers.The Best Student Paper Award was given to Paul Valiant for his paper "Incrementally Veri'able Computation or Knowledge Implies Time/Space E'ciency." These proceedings consist of revised versions of the presented papers. The revisions were not reviewed. The authors bear full responsibility for the contents of their papers. The conference programalso included four special events: an invited talk - titled "Randomness Extractors and Their Cryptographic Applications" by Salil Vadhan; a tutorial entitled "Bridging Cryptography and Game Theory: Recent Results and Future Directions," given by Jonathan Katz (with an accom- nying tutorial in the proceedings); a panel discussion on "Game Theory and Cryptography: Towards a Joint Point of View?" with Tal Rabin as moderator and Jonathan Katz, Silvio Micali, and Moni Naor as panelists; and a Rump Session chaired by Anna Lysyanskaya., This book constitutes the refereed proceedings of the Fifth Theory of Cryptography Conference, TCC 2008. It covers the paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems., TCC 2008, the 5th Theory of Cryptography Conference, was held in New York, New York, March 19-21, 2008, at New York University. TCC 2008 was sp- soredbytheInternationalAssociationforCryptologicResearch(IACR)andwas organizedincooperationwiththeDepartmentofComputerScienceatNewYork University and the Courant Institute for Mathematical Sciences. The General Chairs of the conference were Yevgeniy Dodis and Victor Shoup. The conference received 81 submissions, of which the Program Committee selected34forpresentationattheconference.Theauthorsoftwopapersthen- cidedto mergetheir papers,resulting in a totalof33 presentedpapers.The Best Student Paper Award was given to Paul Valiant for his paper "Incrementally Veri'able Computation or Knowledge Implies Time/Space E'ciency." These proceedings consist of revised versions of the presented papers. The revisions were not reviewed. The authors bear full responsibility for the contents of their papers. The conference programalso included four special events: an invited talk - titled "Randomness Extractors and Their Cryptographic Applications" by Salil Vadhan; a tutorial entitled "Bridging Cryptography and Game Theory: Recent Results and Future Directions," given by Jonathan Katz (with an accom- nying tutorial in the proceedings); a panel discussion on "Game Theory and Cryptography: Towards a Joint Point of View?" with Tal Rabin as moderator and Jonathan Katz, Silvio Micali, and Moni Naor as panelists; and a Rump Session chaired by Anna Lysyanskaya.
    LC Classification Number
    QA268

    賣家提供的物品說明

    賣家簡介

    Eden's Books

    100% 正面信用評價已賣出 583 件物品

    加入日期:10月 2017
    Selling my personal collection - I have large collection of Books, Music, Videos, DVDs, and original Israeli films including many rare items – not available elsewhere.
    瀏覽商店聯絡

    詳盡賣家評級

    過去 12 個月的平均評級
    說明準確
    5.0
    運費合理
    4.7
    運送速度
    4.7
    溝通
    4.9

    賣家信用評價 (150)

    全部評級selected
    正面
    中立
    負面