Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II

Gespeichert in:
Bibliographische Detailangaben
Körperschaft: PKC Online (VerfasserIn)
Weitere Verfasser: Hanaoka, Goichiro (HerausgeberIn), Shikata, Junji (HerausgeberIn), Watanabe, Yohei (HerausgeberIn)
Format: Elektronisch Tagungsbericht E-Book
Sprache:English
Veröffentlicht: Cham, Switzerland Springer [2022]
Schriftenreihe:Lecture notes in computer science 13178
Schlagworte:
Online-Zugang:BTU01
FHA01
FHD01
FHI01
FHM01
FHN01
FHR01
FKE01
FLA01
FRO01
FWS01
FWS02
HTW01
TUM01
UBA01
UBG01
UBM01
UBR01
UBT01
UBW01
UBY01
UEI01
UER01
UPA01
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zcb4500
001 BV047875389
003 DE-604
005 20230609
006 a |||| 10|||
007 cr|uuu---uuuuu
008 220309s2022 |||| o||u| ||||||eng d
020 |a 9783030971311  |c Online  |9 978-3-030-97131-1 
024 7 |a 10.1007/978-3-030-97131-1  |2 doi 
035 |a (ZDB-2-SCS)9783030971311 
035 |a (ZDB-2-LNC)9783030971311 
035 |a (OCoLC)1304475930 
035 |a (DE-599)BVBBV047875389 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-355  |a DE-860  |a DE-91  |a DE-19  |a DE-Aug4  |a DE-898  |a DE-861  |a DE-188  |a DE-523  |a DE-859  |a DE-473  |a DE-29  |a DE-863  |a DE-1050  |a DE-20  |a DE-862  |a DE-92  |a DE-824  |a DE-384  |a DE-573  |a DE-M347  |a DE-703  |a DE-706  |a DE-739  |a DE-634 
082 0 |a 005.824  |2 23 
084 |a DAT 465  |2 stub 
111 2 |a PKC  |n 25.  |d 2022  |c Online  |j Verfasser  |0 (DE-588)1253689148  |4 aut 
245 1 0 |a Public-key cryptography – PKC 2022  |b 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II  |c Goichiro Hanaoka, Junji Shikata, Yohei Watanabe (eds.) 
264 1 |a Cham, Switzerland  |b Springer  |c [2022] 
300 |a 1 Online-Ressource (xiv, 530 Seiten)  |b 68 Illustrationen, 9 in Farbe 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 13178  |a Security and cryptology 
650 4 |a Cryptology 
650 4 |a Computer Communication Networks 
650 4 |a Coding and Information Theory 
650 4 |a Mobile and Network Security 
650 4 |a Computer and Information Systems Applications 
650 4 |a Cryptography 
650 4 |a Data encryption (Computer science) 
650 4 |a Computer networks  
650 4 |a Coding theory 
650 4 |a Information theory 
650 4 |a Computer networks—Security measures 
650 4 |a Application software 
650 0 7 |a Public-Key-Kryptosystem  |0 (DE-588)4209133-0  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2022  |z Online  |2 gnd-content 
689 0 0 |a Public-Key-Kryptosystem  |0 (DE-588)4209133-0  |D s 
689 0 |5 DE-604 
700 1 |a Hanaoka, Goichiro  |4 edt 
700 1 |a Shikata, Junji  |4 edt 
700 1 |a Watanabe, Yohei  |4 edt 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-97130-4 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-3-030-97132-8 
830 0 |a Lecture notes in computer science  |v 13178  |w (DE-604)BV014880109  |9 13178 
856 4 0 |u https://doi.org/10.1007/978-3-030-97131-1  |x Verlag  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-2-SCS  |a ZDB-2-LNC 
940 1 |q ZDB-2-SCS_2022 
940 1 |q ZDB-2-LNC_2022 
999 |a oai:aleph.bib-bvb.de:BVB01-033257808 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l BTU01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FHA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FHD01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FHI01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FHM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FHN01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FHR01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FKE01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FLA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FRO01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FWS01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l FWS02  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l HTW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l TUM01  |p ZDB-2-LNC  |q ZDB-2-LNC_2022  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UBA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UBG01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UBM01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UBR01  |p ZDB-2-SCS  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UBT01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UBW01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UBY01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UEI01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UER01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 
966 e |u https://doi.org/10.1007/978-3-030-97131-1  |l UPA01  |p ZDB-2-LNC  |x Verlag  |3 Volltext 

Datensatz im Suchindex

DE-BY-FWS_katkey 971141
DE-BY-TUM_katkey 2614957
DE-BY-TUM_local_url Verlag
https://doi.org/10.1007/978-3-030-97131-1
DE-BY-UBG_katkey 196848125
DE-BY-UBG_local_url Verlag
https://doi.org/10.1007/978-3-030-97131-1
_version_ 1816714772508311552
adam_txt
any_adam_object
any_adam_object_boolean
author2 Hanaoka, Goichiro
Shikata, Junji
Watanabe, Yohei
author2_role edt
edt
edt
author2_variant g h gh
j s js
y w yw
author_corporate PKC Online
author_corporate_role aut
author_facet Hanaoka, Goichiro
Shikata, Junji
Watanabe, Yohei
PKC Online
author_sort PKC Online
building Verbundindex
bvnumber BV047875389
classification_tum DAT 465
collection ZDB-2-SCS
ZDB-2-LNC
ctrlnum (ZDB-2-SCS)9783030971311
(ZDB-2-LNC)9783030971311
(OCoLC)1304475930
(DE-599)BVBBV047875389
dewey-full 005.824
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.824
dewey-search 005.824
dewey-sort 15.824
dewey-tens 000 - Computer science, information, general works
discipline Informatik
discipline_str_mv Informatik
doi_str_mv 10.1007/978-3-030-97131-1
format Electronic
Conference Proceeding
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05032nmm a2200937zcb4500</leader><controlfield tag="001">BV047875389</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20230609 </controlfield><controlfield tag="006">a |||| 10||| </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220309s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030971311</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-97131-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-97131-1</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030971311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-LNC)9783030971311</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1304475930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047875389</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.824</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">PKC</subfield><subfield code="n">25.</subfield><subfield code="d">2022</subfield><subfield code="c">Online</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)1253689148</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Public-key cryptography – PKC 2022</subfield><subfield code="b">25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II</subfield><subfield code="c">Goichiro Hanaoka, Junji Shikata, Yohei Watanabe (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham, Switzerland</subfield><subfield code="b">Springer</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiv, 530 Seiten)</subfield><subfield code="b">68 Illustrationen, 9 in Farbe</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13178</subfield><subfield code="a">Security and cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptology</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Communication Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding and Information Theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer and Information Systems Applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks </subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks—Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2022</subfield><subfield code="z">Online</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Public-Key-Kryptosystem</subfield><subfield code="0">(DE-588)4209133-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hanaoka, Goichiro</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shikata, Junji</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Watanabe, Yohei</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-97130-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-97132-8</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">13178</subfield><subfield code="w">(DE-604)BV014880109</subfield><subfield code="9">13178</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-LNC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2022</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-LNC_2022</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033257808</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="q">ZDB-2-LNC_2022</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UEI01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-97131-1</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-LNC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2022 Online gnd-content
genre_facet Konferenzschrift 2022 Online
id DE-604.BV047875389
illustrated Not Illustrated
index_date 2024-07-03T19:21:11Z
indexdate 2024-11-25T18:02:39Z
institution BVB
institution_GND (DE-588)1253689148
isbn 9783030971311
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-033257808
oclc_num 1304475930
open_access_boolean
owner DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-824
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
owner_facet DE-355
DE-BY-UBR
DE-860
DE-91
DE-BY-TUM
DE-19
DE-BY-UBM
DE-Aug4
DE-898
DE-BY-UBR
DE-861
DE-188
DE-523
DE-859
DE-473
DE-BY-UBG
DE-29
DE-863
DE-BY-FWS
DE-1050
DE-20
DE-862
DE-BY-FWS
DE-92
DE-824
DE-384
DE-573
DE-M347
DE-703
DE-706
DE-739
DE-634
physical 1 Online-Ressource (xiv, 530 Seiten) 68 Illustrationen, 9 in Farbe
psigel ZDB-2-SCS
ZDB-2-LNC
ZDB-2-SCS_2022
ZDB-2-LNC_2022
ZDB-2-LNC ZDB-2-LNC_2022
publishDate 2022
publishDateSearch 2022
publishDateSort 2022
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
Security and cryptology
spellingShingle Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II
Lecture notes in computer science
Cryptology
Computer Communication Networks
Coding and Information Theory
Mobile and Network Security
Computer and Information Systems Applications
Cryptography
Data encryption (Computer science)
Computer networks 
Coding theory
Information theory
Computer networks—Security measures
Application software
Public-Key-Kryptosystem (DE-588)4209133-0 gnd
subject_GND (DE-588)4209133-0
(DE-588)1071861417
title Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II
title_auth Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II
title_exact_search Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II
title_exact_search_txtP Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II
title_full Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II Goichiro Hanaoka, Junji Shikata, Yohei Watanabe (eds.)
title_fullStr Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II Goichiro Hanaoka, Junji Shikata, Yohei Watanabe (eds.)
title_full_unstemmed Public-key cryptography – PKC 2022 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II Goichiro Hanaoka, Junji Shikata, Yohei Watanabe (eds.)
title_short Public-key cryptography – PKC 2022
title_sort public key cryptography pkc 2022 25th iacr international conference on practice and theory of public key cryptography virtual event march 8 11 2022 proceedings part ii
title_sub 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, virtual event, March 8–11, 2022, proceedings, part II
topic Cryptology
Computer Communication Networks
Coding and Information Theory
Mobile and Network Security
Computer and Information Systems Applications
Cryptography
Data encryption (Computer science)
Computer networks 
Coding theory
Information theory
Computer networks—Security measures
Application software
Public-Key-Kryptosystem (DE-588)4209133-0 gnd
topic_facet Cryptology
Computer Communication Networks
Coding and Information Theory
Mobile and Network Security
Computer and Information Systems Applications
Cryptography
Data encryption (Computer science)
Computer networks 
Coding theory
Information theory
Computer networks—Security measures
Application software
Public-Key-Kryptosystem
Konferenzschrift 2022 Online
url https://doi.org/10.1007/978-3-030-97131-1
volume_link (DE-604)BV014880109
work_keys_str_mv AT pkconline publickeycryptographypkc202225thiacrinternationalconferenceonpracticeandtheoryofpublickeycryptographyvirtualeventmarch8112022proceedingspartii
AT hanaokagoichiro publickeycryptographypkc202225thiacrinternationalconferenceonpracticeandtheoryofpublickeycryptographyvirtualeventmarch8112022proceedingspartii
AT shikatajunji publickeycryptographypkc202225thiacrinternationalconferenceonpracticeandtheoryofpublickeycryptographyvirtualeventmarch8112022proceedingspartii
AT watanabeyohei publickeycryptographypkc202225thiacrinternationalconferenceonpracticeandtheoryofpublickeycryptographyvirtualeventmarch8112022proceedingspartii