Composition of Secure Multi-Party Protocols : Comprehensive Study (Record no. 22202)

000 -LEADER
fixed length control field 00530nam a2200169Ia 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161214s9999 xx 000 0 und d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783540201052
Terms of availability pbk
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004
Item number LIN
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Lindell, Yehuda
245 #0 - TITLE STATEMENT
Title Composition of Secure Multi-Party Protocols : Comprehensive Study
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc New York:
Name of publisher, distributor, etc Springer-Verlag,
Date of publication, distribution, etc 2003
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 192 p.;
Other physical details index:
Dimensions 23 cm.
365 ## - TRADE PRICE
Price type code INR
Price amount 2023.00/ EURO 34.00
490 ## - SERIES STATEMENT
Series statement Lecture notes in computer science
520 ## - SUMMARY, ETC.
Summary, etc This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols."--BOOK JACKET.
In the setting of multi-party computation, sets of two or more parties with private inputs wish to jointly compute some (predetermined) function of their inputs. General results concerning secure two-party or multi-party computation were first announced in the 1980s. Put briefly, these results assert that under certain assumptions one can construct protocols for securely computing any desired multi-party functionality. However, this research relates only to a setting where a single protocol execution is carried out. In contrast, in modern networks, many different protocol executions are run at the same time. This book is devoted to the general and systematic study of secure multi-party computation under composition. Despite its emphasis on a theoretically well-founded treatment of the subject, general techniques for designing secure protocols are developed that may even result in schemes or modules to be incorporated in practical systems. The book clarifies fundamental issues regarding security in a multi-execution environment and gives a comprehensive and unique treatment of the composition of secure multi-party protocols
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Authenticated Byzantine Agreement
Topical term or geographic name as entry element Computer networks
Topical term or geographic name as entry element Data encryption
Topical term or geographic name as entry element Management information systems
Topical term or geographic name as entry element Management of Computing and Information Systems
Topical term or geographic name as entry element Operating systems
Topical term or geographic name as entry element Computers and civilization
Topical term or geographic name as entry element Multi-party protocols
Topical term or geographic name as entry element Computers access control
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2004-01-21 Segment Book Distributors; Invoice No# 15654; 2004-01-17 2023.00 1 004 LIN 008467 2019-12-09 2019-07-15 Books

Powered by Koha