Identity-based cryptography / edited by Marc Joye and Gregory Neven.
Saved in:
Superior document: | Cryptology and information security series, v. 2 |
---|---|
: | |
TeilnehmendeR: | |
Year of Publication: | 2009 |
Language: | English |
Series: | Cryptology and information security series ;
v. 2. |
Online Access: | |
Physical Description: | viii, 263 p. :; ill. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
500433453 |
---|---|
ctrlnum |
(MiAaPQ)500433453 (Au-PeEL)EBL433453 (CaPaEBR)ebr10285498 (CaONFJC)MIL207060 (OCoLC)646807197 |
collection |
bib_alma |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01459nam a2200385Ia 4500</leader><controlfield tag="001">500433453</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">081220s2009 ne a sb 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2008940895</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1586039474</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781586039479</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)500433453</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL433453</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10285498</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL207060</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)646807197</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">I3394 2009</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Identity-based cryptography</subfield><subfield code="h">[electronic resource] /</subfield><subfield code="c">edited by Marc Joye and Gregory Neven.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">c2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">viii, 263 p. :</subfield><subfield code="b">ill.</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Cryptology and information security series,</subfield><subfield code="x">1871-6431 ;</subfield><subfield code="v">v. 2</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 245-262) and index.</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Public key cryptography.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Joye, Marc,</subfield><subfield code="d">1969-</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neven, Gregory.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Cryptology and information security series ;</subfield><subfield code="v">v. 2.</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=433453</subfield><subfield code="z">Click to View</subfield></datafield></record></collection> |
record_format |
marc |
spelling |
Identity-based cryptography [electronic resource] / edited by Marc Joye and Gregory Neven. Amsterdam ; Boston : IOS Press, c2009. viii, 263 p. : ill. Cryptology and information security series, 1871-6431 ; v. 2 Includes bibliographical references (p. 245-262) and index. Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries. Data encryption (Computer science) Public key cryptography. Electronic books. Joye, Marc, 1969- Neven, Gregory. ProQuest (Firm) Cryptology and information security series ; v. 2. https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=433453 Click to View |
language |
English |
format |
Electronic eBook |
author2 |
Joye, Marc, 1969- Neven, Gregory. ProQuest (Firm) |
author_facet |
Joye, Marc, 1969- Neven, Gregory. ProQuest (Firm) ProQuest (Firm) |
author2_variant |
m j mj g n gn |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR |
author_corporate |
ProQuest (Firm) |
author_sort |
Joye, Marc, 1969- |
title |
Identity-based cryptography |
spellingShingle |
Identity-based cryptography Cryptology and information security series, |
title_full |
Identity-based cryptography [electronic resource] / edited by Marc Joye and Gregory Neven. |
title_fullStr |
Identity-based cryptography [electronic resource] / edited by Marc Joye and Gregory Neven. |
title_full_unstemmed |
Identity-based cryptography [electronic resource] / edited by Marc Joye and Gregory Neven. |
title_auth |
Identity-based cryptography |
title_new |
Identity-based cryptography |
title_sort |
identity-based cryptography |
series |
Cryptology and information security series, |
series2 |
Cryptology and information security series, |
publisher |
IOS Press, |
publishDate |
2009 |
physical |
viii, 263 p. : ill. |
issn |
1871-6431 ; |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 I3394 42009 |
genre |
Electronic books. |
genre_facet |
Electronic books. |
url |
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=433453 |
illustrated |
Illustrated |
oclc_num |
646807197 |
work_keys_str_mv |
AT joyemarc identitybasedcryptography AT nevengregory identitybasedcryptography AT proquestfirm identitybasedcryptography |
status_str |
n |
ids_txt_mv |
(MiAaPQ)500433453 (Au-PeEL)EBL433453 (CaPaEBR)ebr10285498 (CaONFJC)MIL207060 (OCoLC)646807197 |
hierarchy_parent_title |
Cryptology and information security series, v. 2 |
hierarchy_sequence |
v. 2. |
is_hierarchy_title |
Identity-based cryptography |
container_title |
Cryptology and information security series, v. 2 |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField |
_version_ |
1792330690240446464 |