LEADER 04143nam 22008175 450 001 996465678903316 005 20200701174842.0 010 $a3-642-19379-X 024 7 $a10.1007/978-3-642-19379-8 035 $a(CKB)2670000000071966 035 $a(SSID)ssj0000476600 035 $a(PQKBManifestationID)11332001 035 $a(PQKBTitleCode)TC0000476600 035 $a(PQKBWorkID)10479561 035 $a(PQKB)10522213 035 $a(DE-He213)978-3-642-19379-8 035 $a(MiAaPQ)EBC3066513 035 $a(PPN)151585202 035 $a(EXLCZ)992670000000071966 100 $a20110228d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aPublic Key Cryptography -- PKC 2011$b[electronic resource] $e14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011, Proceedings /$fedited by Dario Catalano, Nelly Fazio, Rosario Gennaro, Antonio Nicolosi 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XIII, 495 p. 22 illus.) 225 1 $aSecurity and Cryptology ;$v6571 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-19378-1 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the thoroughly refereed proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography, PKC 2011, held in Taormina, Italy, in March 2011. The 28 papers presented were carefully reviewed and selected from 103 submissions. The book also contains one invited talk. The papers are grouped in topical sections on signatures, attribute based encryption, number theory, protocols, chosen-ciphertext security, encryption, zero-knowledge, and cryptanalysis. 410 0$aSecurity and Cryptology ;$v6571 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aAlgorithms 606 $aComputer security 606 $aComputer science?Mathematics 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aAlgorithms. 615 0$aComputer security. 615 0$aComputer science?Mathematics. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aSystems and Data Security. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.8 702 $aCatalano$b Dario$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aFazio$b Nelly$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGennaro$b Rosario$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNicolosi$b Antonio$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Workshop on Practice and Theory in Public Key Cryptography 906 $aBOOK 912 $a996465678903316 996 $aPublic Key Cryptography -- PKC 2011$92831554 997 $aUNISA