Identity-based cryptography:
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston
IOS Press
2009
|
Schriftenreihe: | Cryptology and information security series
v. 2 |
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (viii, 263 pages) illustrations |
ISBN: | 9781607503897 1607503891 9781441605528 1441605525 9781597345903 1597345903 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV045348895 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2009 |||| o||u| ||||||eng d | ||
020 | |a 9781607503897 |9 978-1-60750-389-7 | ||
020 | |a 1607503891 |9 1-60750-389-1 | ||
020 | |a 9781441605528 |9 978-1-4416-0552-8 | ||
020 | |a 1441605525 |9 1-4416-0552-5 | ||
020 | |a 9781597345903 |9 978-1-59734-590-3 | ||
020 | |a 1597345903 |9 1-59734-590-3 | ||
035 | |a (ZDB-4-ITC)ocn646807197 | ||
035 | |a (OCoLC)646807197 | ||
035 | |a (DE-599)BVBBV045348895 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8/2 |2 22 | |
245 | 1 | 0 | |a Identity-based cryptography |c edited by Marc Joye and Gregory Neven |
264 | 1 | |a Amsterdam ; Boston |b IOS Press |c 2009 | |
300 | |a 1 online resource (viii, 263 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Cryptology and information security series |v v. 2 | |
500 | |a Print version record | ||
505 | 8 | |a Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description | |
650 | 7 | |a COMPUTERS / Security / Cryptography |2 bisacsh | |
650 | 7 | |a Computer science |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 7 | |a Public key cryptography |2 fast | |
650 | 4 | |a Data encryption (Computer science) |a Public key cryptography |a Computer security |a Computer science | |
700 | 1 | |a Joye, Marc |d 1969- |e Sonstige |4 oth | |
700 | 1 | |a Neven, Gregory |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Identity-based cryptography |d Amsterdam ; Boston : IOS Press, 2009 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735547 |
Datensatz im Suchindex
_version_ | 1804179172327686144 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045348895 |
collection | ZDB-4-ITC |
contents | Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description |
ctrlnum | (ZDB-4-ITC)ocn646807197 (OCoLC)646807197 (DE-599)BVBBV045348895 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02265nmm a2200469zcb4500</leader><controlfield tag="001">BV045348895</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607503897</subfield><subfield code="9">978-1-60750-389-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607503891</subfield><subfield code="9">1-60750-389-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781441605528</subfield><subfield code="9">978-1-4416-0552-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1441605525</subfield><subfield code="9">1-4416-0552-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597345903</subfield><subfield code="9">978-1-59734-590-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597345903</subfield><subfield code="9">1-59734-590-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn646807197</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)646807197</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348895</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identity-based cryptography</subfield><subfield code="c">edited by Marc Joye and Gregory Neven</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam ; Boston</subfield><subfield code="b">IOS Press</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (viii, 263 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Cryptology and information security series</subfield><subfield code="v">v. 2</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Cryptography</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer science</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Public key cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="a">Public key cryptography</subfield><subfield code="a">Computer security</subfield><subfield code="a">Computer science</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Joye, Marc</subfield><subfield code="d">1969-</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Neven, Gregory</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Identity-based cryptography</subfield><subfield code="d">Amsterdam ; Boston : IOS Press, 2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735547</subfield></datafield></record></collection> |
id | DE-604.BV045348895 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:38Z |
institution | BVB |
isbn | 9781607503897 1607503891 9781441605528 1441605525 9781597345903 1597345903 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735547 |
oclc_num | 646807197 |
open_access_boolean | |
physical | 1 online resource (viii, 263 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | IOS Press |
record_format | marc |
series2 | Cryptology and information security series |
spelling | Identity-based cryptography edited by Marc Joye and Gregory Neven Amsterdam ; Boston IOS Press 2009 1 online resource (viii, 263 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Cryptology and information security series v. 2 Print version record Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description COMPUTERS / Security / Cryptography bisacsh Computer science fast Computer security fast Data encryption (Computer science) fast Public key cryptography fast Data encryption (Computer science) Public key cryptography Computer security Computer science Joye, Marc 1969- Sonstige oth Neven, Gregory Sonstige oth Erscheint auch als Druck-Ausgabe Identity-based cryptography Amsterdam ; Boston : IOS Press, 2009 |
spellingShingle | Identity-based cryptography Posed as an open problem in 1984, but efficiently instantiated only in 2001, identity-based encryption hasn't left the forefront of cryptographic research since. Praised by fans as the economical alternative to public-key infrastructures, booed by critics for its inherent key escrow, identity-based cryptography is also the topic of numerous debates in the cryptographic community. "Identity-Based Cryptography" looks beyond the controversy and intends to give an overview of the current state-of-the-art in identity-based cryptography. -- Publisher description COMPUTERS / Security / Cryptography bisacsh Computer science fast Computer security fast Data encryption (Computer science) fast Public key cryptography fast Data encryption (Computer science) Public key cryptography Computer security Computer science |
title | Identity-based cryptography |
title_auth | Identity-based cryptography |
title_exact_search | Identity-based cryptography |
title_full | Identity-based cryptography edited by Marc Joye and Gregory Neven |
title_fullStr | Identity-based cryptography edited by Marc Joye and Gregory Neven |
title_full_unstemmed | Identity-based cryptography edited by Marc Joye and Gregory Neven |
title_short | Identity-based cryptography |
title_sort | identity based cryptography |
topic | COMPUTERS / Security / Cryptography bisacsh Computer science fast Computer security fast Data encryption (Computer science) fast Public key cryptography fast Data encryption (Computer science) Public key cryptography Computer security Computer science |
topic_facet | COMPUTERS / Security / Cryptography Computer science Computer security Data encryption (Computer science) Public key cryptography Data encryption (Computer science) Public key cryptography Computer security Computer science |
work_keys_str_mv | AT joyemarc identitybasedcryptography AT nevengregory identitybasedcryptography |