<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000cmm a22000005i 4500</leader>
  <controlfield tag="001">UP-99796217611057524</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20230504003249.0</controlfield>
  <controlfield tag="006">m    go  j        </controlfield>
  <controlfield tag="007">cr |n |||auu|a</controlfield>
  <controlfield tag="008">111130s2011    xx         u |      eng d</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9783642253850(eBook)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">3642253857(eBook)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">(iLib)UPD-00210204129</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">DLC</subfield>
   <subfield code="d">DML</subfield>
  </datafield>
  <datafield tag="041" ind1=" " ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="084" ind1=" " ind2=" ">
   <subfield code="a">QA76.9.A25</subfield>
   <subfield code="b">I58 2011eb</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
   <subfield code="a">Lee, Dong Hoon.</subfield>
   <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">Advances in Cryptology - ASIACRYPT 2011</subfield>
   <subfield code="b">17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings</subfield>
   <subfield code="h">[electronic resource]</subfield>
   <subfield code="c">edited by Dong Hoon Lee, Xiaoyun Wang.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">Berlin, Heidelberg</subfield>
   <subfield code="b">Springer Berlin Heidelberg</subfield>
   <subfield code="c">2011.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (XIV, 760 p.)</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">This book constitutes the proceedings of the 17th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2011, held in Seoul, Korea, in December 2011. The 40 revised papers included in this volume were carefully reviewed and selected from 266 submissions. The contributions are organized in topical sections on lattices and quantum cryptography; public key encryption; database privacy; hash function; symmetric key encryption; zero knowledge proof; universal composability; foundation; secure computation and secret sharing; public key signature; and leakage resilient cryptography.</subfield>
  </datafield>
  <datafield tag="533" ind1=" " ind2=" ">
   <subfield code="a">Electronic reproduction.</subfield>
   <subfield code="b">New York</subfield>
   <subfield code="c">SpringerLink</subfield>
   <subfield code="d">2011.</subfield>
   <subfield code="n">Available via World Wide Web through SpringerLink.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computer science.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Data protection.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Data encryption (Computer science).</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computer software.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computational complexity.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Information Systems.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Mathematics.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computer Science.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Data Encryption.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Algorithm Analysis and Problem Complexity.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Management of Computing and Information Systems.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Discrete Mathematics in Computer Science.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Systems and Data Security.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Applications of Mathematics.</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="a">Wang, Xiaoyun.</subfield>
   <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="710" ind1="2" ind2=" ">
   <subfield code="a">SpringerLink (Online service).</subfield>
  </datafield>
  <datafield tag="773" ind1="0" ind2=" ">
   <subfield code="a">Springer eBooks.</subfield>
  </datafield>
  <datafield tag="776" ind1="0" ind2=" ">
   <subfield code="a">Printed edition</subfield>
   <subfield code="z">9783642253843.</subfield>
  </datafield>
  <datafield tag="842" ind1=" " ind2=" ">
   <subfield code="a">Electronic Resource</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="0">
   <subfield code="u">http://link.springer.com/book/10.1007/978-3-642-25385-0</subfield>
   <subfield code="z">Available for University of the Philippines Diliman via SpringerLink. Click here to access</subfield>
  </datafield>
  <datafield tag="856" ind1=" " ind2=" ">
   <subfield code="z">(viewed 14 February 2014)</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="950" ind1=" " ind2=" ">
   <subfield code="a">Computer Science (Springer-11645)</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DMLR</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Electronic Resource</subfield>
  </datafield>
 </record>
</collection>
