Pairing-Based Cryptography Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers
This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrical track were carefully...
Enregistré dans:
Auteurs principaux : | , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Pairing-Based Cryptography Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / edited by Michel Abdalla, Tanja Lange. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7708 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Pairing-Based Cryptography Pairing 2012 Autre format: Pairing-Based Cryptography -- Pairing 2012 |
LEADER | 03521clm a2200649 4500 | ||
---|---|---|---|
001 | PPN168330032 | ||
003 | http://www.sudoc.fr/168330032 | ||
005 | 20241001155200.0 | ||
010 | |a 978-3-642-36334-4 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-36334-4 |2 DOI |
035 | |a (OCoLC)829434114 | ||
035 | |a Springer978-3-642-36334-4 | ||
035 | |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-36334-4 | ||
035 | |a Springer-11645-978-3-642-36334-4 | ||
100 | |a 20130325d2013 u u0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Pairing-Based Cryptography Pairing 2012 |e 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers |f edited by Michel Abdalla, Tanja Lange. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2013 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 7708 | |
330 | |a This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrical track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applictions. | ||
371 | 0 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | |
371 | 0 | |a Accès soumis à abonnement pour tout autre établissement | |
371 | 1 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 7708 | |
452 | | | |t Pairing-Based Cryptography Pairing 2012 |b Texte imprimé |y 9783642363337 | |
452 | | | |t Pairing-Based Cryptography -- Pairing 2012 |b Texte imprimé |y 9783642363351 | |
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a Algorithm Analysis and Problem Complexity | |
610 | 2 | |a Coding and Information Theory | |
610 | 1 | |a Cryptology. | |
610 | 2 | |a Data and Information Security | |
610 | 2 | |a Algorithms | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 005.82 |v 23 | ||
680 | |a QA76.9.A25 | ||
700 | 1 | |3 PPN192007718 |a Abdalla |b Michel |4 651 | |
701 | 1 | |a Lange |b Tanja |4 651 | |
801 | 3 | |a FR |b Abes |c 20240814 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20240603 |g AACR2 | |
856 | 4 | |q PDF |u https://doi.org/10.1007/978-3-642-36334-4 |z Accès sur la plateforme de l'éditeur | |
856 | 4 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-KDQ9PGR4-R |z Accès sur la plateforme Istex | |
856 | 4 | |5 441099901:830857303 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-36334-4 | |
915 | |5 441099901:830857303 |b SPRING13-00754 | ||
930 | |5 441099901:830857303 |b 441099901 |j g | ||
991 | |5 441099901:830857303 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:14 | ||
997 | |a NUM |b SPRING13-00754 |d NUMpivo |e EM |s d | ||
998 | |a 978583 |