| 000 | 01670nam a22003495i 4500 | ||
|---|---|---|---|
| 001 | vtls001951194 | ||
| 003 | NLI | ||
| 005 | 20210630064219.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 170531s2014 gw | s |||| 0|eng d | ||
| 020 |
_a9783642546310 _9978-3-642-54631-0 |
||
| 039 | 9 |
_y201705311432 _zgopag |
|
| 041 | 0 | _aeng | |
| 044 | _agw | ||
| 245 | 1 | 0 |
_aPublic-Key Cryptography - PKC 2014 _h[electronic resource] : _b17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings / _cedited by Hugo Krawczyk. |
| 260 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2014. |
||
| 300 | _a1 online resource (XIV, 686 p. 59 ill.) | ||
| 440 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8383 _9833933 |
|
| 505 | 0 | _aChosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols. | |
| 650 | 0 | _aComputer science. | |
| 650 | 0 |
_aComputer security. _9676081 |
|
| 650 | 0 |
_aData encryption (Computer science). _9676080 |
|
| 650 | 0 |
_aCoding theory. _9725738 |
|
| 650 | 0 |
_aAlgorithms. _9783689 |
|
| 700 | 1 |
_aKrawczyk, Hugo, _4edt _91309273 |
|
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-642-54631-0 |
| 887 | _a Gopa | ||
| 905 | _aGopa | ||
| 949 |
_AVIRTUAITEM _D10000 _X206 _6EBK000025967NG _eEBK25967 |
||
| 942 |
_2ddc _cBKS |
||
| 999 |
_aVIRTUA _c1374591 _d1374591 |
||
| 999 | _aVTLSSORT0070*0080*0200*0410*0440*2450*2600*3000*4400*5050*6500*6501*6502*6503*6504*7000*8560*9050*9992 | ||