000 01670nam a22003495i 4500
001 vtls001951194
003 NLI
005 20210630064219.0
007 cr nn 008mamaa
008 170531s2014 gw | s |||| 0|eng d
020 _a9783642546310
_9978-3-642-54631-0
039 9 _y201705311432
_zgopag
041 0 _aeng
044 _agw
245 1 0 _aPublic-Key Cryptography - PKC 2014
_h[electronic resource] :
_b17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings /
_cedited by Hugo Krawczyk.
260 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2014.
300 _a1 online resource (XIV, 686 p. 59 ill.)
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v8383
_9833933
505 0 _aChosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity and attribute-based encryption -- Enhanced encryption -- Signature schemes -- Related-key security -- Functional authentication -- Quantum impossibility -- Privacy -- Protocols.
650 0 _aComputer science.
650 0 _aComputer security.
_9676081
650 0 _aData encryption (Computer science).
_9676080
650 0 _aCoding theory.
_9725738
650 0 _aAlgorithms.
_9783689
700 1 _aKrawczyk, Hugo,
_4edt
_91309273
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-54631-0
887 _a Gopa
905 _aGopa
949 _AVIRTUAITEM
_D10000
_X206
_6EBK000025967NG
_eEBK25967
942 _2ddc
_cBKS
999 _aVIRTUA
_c1374591
_d1374591
999 _aVTLSSORT0070*0080*0200*0410*0440*2450*2600*3000*4400*5050*6500*6501*6502*6503*6504*7000*8560*9050*9992