000 | 03567nam a22006975i 4500 | ||
---|---|---|---|
001 | 978-3-030-17259-6 | ||
003 | DE-He213 | ||
005 | 20240730203825.0 | ||
007 | cr nn 008mamaa | ||
008 | 190405s2019 sz | s |||| 0|eng d | ||
020 |
_a9783030172596 _9978-3-030-17259-6 |
||
024 | 7 |
_a10.1007/978-3-030-17259-6 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aPublic-Key Cryptography - PKC 2019 _h[electronic resource] : _b22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II / _cedited by Dongdai Lin, Kazue Sako. |
250 | _a1st ed. 2019. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2019. |
|
300 |
_aXVIII, 680 p. 1258 illus., 29 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v11443 |
|
505 | 0 | _aCryptographic Protocols -- Digital Signatures -- Zero-Knowledge -- Identity-Based Encryption -- Fundamental Primitives -- Public Key Encryptions -- Functional Encryption.-Obfuscation Based Cryptography -- Re- Encryption Schemes -- Post Quantum Cryptography. | |
520 | _aThe two-volume set LNCS 11442 and 11443 constitutes the refereed proceedings of the 22nd IACR International Conference on the Practice and Theory of Public-Key Cryptography, PKC 2019, held in Beijing, China, in April 2019. The 42 revised papers presented were carefully reviewed and selected from 173 submissions. They are organized in topical sections such as: Cryptographic Protocols; Digital Signatures; Zero-Knowledge; Identity-Based Encryption; Fundamental Primitives; Public Key Encryptions; Functional Encryption; Obfuscation Based Cryptography; Re- Encryption Schemes; Post Quantum Cryptography. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aComputer engineering. _910164 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 0 |
_aComputers _xLaw and legislation. _975151 |
|
650 | 0 |
_aInformation technology _xLaw and legislation. _982531 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aComputer Engineering and Networks. _9177355 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
650 | 2 | 4 |
_aLegal Aspects of Computing. _953952 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aCoding and Information Theory. _9177356 |
700 | 1 |
_aLin, Dongdai. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9177357 |
|
700 | 1 |
_aSako, Kazue. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9177358 |
|
710 | 2 |
_aSpringerLink (Online service) _9177359 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783030172589 |
776 | 0 | 8 |
_iPrinted edition: _z9783030172602 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v11443 _9177360 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-030-17259-6 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c97628 _d97628 |