LEADER 01475nam 2200409Ia 450 001 9910698340503321 005 20080227143420.0 035 $a(CKB)4970000000022737 035 $a(OCoLC)212195537 035 $a(EXLCZ)994970000000022737 100 $a20080227d2008 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aDefense infrastructure$b[electronic resource] $erealignment of Air Force Special Operations Command units to Cannon Air Force Base, New Mexico 210 1$aWashington, DC :$cU.S. Govt. Accountability Office,$d[2008] 215 $a14 pages $cdigital, PDF file 300 $aTitle from title screen (viewed on Feb. 14, 2008). 300 $aAuthor: Brian J. Lepore. 300 $a"January 18, 2008." 300 $aPaper version available from: U.S. Govt. Accountability Office, 441 G St., NW, Rm. LM, Washington, D.C. 20548. 300 $a"GAO-08-244R." 320 $aIncludes bibliographical references. 517 $aDefense Infrastructure 606 $aMilitary base closures$zNew Mexico 607 $aCannon Air Force Base (N.M.) 615 0$aMilitary base closures 700 $aLepore$b Brian J$01388056 712 02$aUnited States.$bGovernment Accountability Office. 801 0$bGPO 801 1$bGPO 906 $aDOCUMENT 912 $a9910698340503321 996 $aDefense infrastructure$93438419 997 $aUNINA LEADER 04916nam 22008535 450 001 9910484143503321 005 20251226202902.0 010 $a3-540-73489-9 024 7 $a10.1007/978-3-540-73489-5 035 $a(CKB)1000000000490854 035 $a(SSID)ssj0000319320 035 $a(PQKBManifestationID)11222401 035 $a(PQKBTitleCode)TC0000319320 035 $a(PQKBWorkID)10337824 035 $a(PQKB)10560139 035 $a(DE-He213)978-3-540-73489-5 035 $a(MiAaPQ)EBC3063304 035 $a(MiAaPQ)EBC6694717 035 $a(Au-PeEL)EBL6694717 035 $a(PPN)12316351X 035 $a(MiAaPQ)EBC337154 035 $a(BIP)34164909 035 $a(BIP)14226089 035 $a(EXLCZ)991000000000490854 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPairing-Based Cryptography - Pairing 2007 $eFirst International Conference, Pairing 2007, Tokyo, Japan, July 2-4, 2007, Proceedings /$fedited by Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XIII, 410 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4575 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-73488-0 327 $aInvited Talk I -- Bilinear Groups of Composite Order -- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user System -- Practical Time Capsule Signatures in the Standard Model from Bilinear Maps -- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys -- Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles) -- General and Efficient Certificateless Public Key Encryption Constructions -- Invited Talk II -- Hyperelliptic Pairings -- Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2 -- Constructing Pairing-Friendly Genus 2 Curves with Ordinary Jacobians -- Invited Talk III -- Implementing Cryptographic Pairings over Barreto-Naehrig Curves -- Instruction Set Extensions for Pairing-Based Cryptography -- The Importance of the Final Exponentiation in Pairings When Considering Fault Attacks -- Protocol I -- Proxy Re-encryption Systems for Identity-Based Encryption -- Fair Blind Signatures Revisited -- Invited Talk IV -- Supersingular Elliptic Curves in Cryptography -- On the Minimal Embedding Field -- Remarks on Cheon?s Algorithms for Pairing-Related Problems -- Invited Talk V -- On Pairing Inversion Problems -- The Tate Pairing Via Elliptic Nets -- Eta Pairing Computation on General Divisors over Hyperelliptic Curves y 2?=?x 7???x ±1 -- Protocol II -- Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length -- Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption Key. 330 $aPairing-based cryptography is at the very leading edge of the current wave in computer cryptography. That makes this book all the more relevant, being as it is the refereed proceedings of the First International Conference on Pairing-Based Cryptography, Pairing 2007, held in Tokyo, Japan in 2007. The 18 revised full papers presented together were carefully reviewed and selected from 86 submissions. The papers are organized in topical sections including those on applications, and certificateless public key encryption. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4575 606 $aCoding theory 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aCoding and Information Theory 606 $aCryptology 606 $aAlgorithms 606 $aDiscrete Mathematics in Computer Science 606 $aSymbolic and Algebraic Manipulation 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aAlgorithms. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSymbolic and Algebraic Manipulation. 676 $a005.8 702 $aTakagi$b Tsuyoshi 712 12$aInternational Conference on Pairing-Based Cryptography 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484143503321 996 $aPairing-Based Cryptography – Pairing 2007$9774269 997 $aUNINA