It looks like you're offline.
Open Library logo
additional options menu

MARC Record from marc_columbia

Record ID marc_columbia/Columbia-extract-20221130-031.mrc:201274312:3740
Source marc_columbia
Download Link /show-records/marc_columbia/Columbia-extract-20221130-031.mrc:201274312:3740?format=raw

LEADER: 03740cam a2200685Ii 4500
001 15114661
005 20220402235144.0
006 m o d
007 cr cnu---unuuu
008 160927t20172017flua ob 001 0 eng d
035 $a(OCoLC)ocn959278001
035 $a(NNC)15114661
040 $aN$T$beng$erda$epn$cN$T$dN$T$dYDX$dIDEBK$dCOO$dCRCPR$dWAU$dOCLCF$dOCLCQ$dUPM$dCSAIL$dCNCGM$dOCLCQ$dEZ9$dRRP$dU3W$dWYU$dOCLCQ$dUAB$dTYFRS$dOCLCQ$dUKAHL$dK6U$dOCLCO
019 $a959274518$a959868312$a966405227
020 $a9781315355399$q(electronic book)
020 $a1315355396$q(electronic book)
020 $z9781482248609$q(hardcover ;$qacid-free paper)
020 $z1482248603$q(hardcover ;$qacid-free paper)
020 $a9781315372693
020 $a131537269X
035 $a(OCoLC)959278001$z(OCoLC)959274518$z(OCoLC)959868312$z(OCoLC)966405227
050 4 $aQA76.9.A25$bX75 2017eb
072 7 $aCOM$x083000$2bisacsh
082 04 $a005.8/2$223
049 $aZCUA
100 1 $aXiong, Hu,$eauthor.
245 10 $aIntroduction to certificateless cryptography /$cHu Xiong, Zhen Qin, and Athanasios V. Vasilakos.
264 1 $aBoca Raton :$bCRC Press, Taylor & Francis Group,$c[2017]
264 4 $c©2017
300 $a1 online resource :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
504 $aIncludes bibliographical references and index.
505 0 $aSection I. Setting the stage -- Section II. CL-PKC without random oracles -- Section III. CL-PKC in random oracle models -- Section IV. Applications, extensions, and related paradigms -- Section V. Future directions.
520 $a"As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand"--Provided by publisher.
588 0 $aPrint version record.
650 0 $aPublic key infrastructure (Computer security)
650 0 $aPublic key cryptography.
650 0 $aIdentification.
650 0 $aData encryption (Computer science)
650 0 $aComputer networks$xSecurity measures.
650 6 $aInfrastructure à clé publique (Sécurité informatique)
650 6 $aCryptographie à clé publique.
650 6 $aIdentification.
650 6 $aChiffrement (Informatique)
650 6 $aRéseaux d'ordinateurs$xSécurité$xMesures.
650 7 $aCOMPUTERS$xSecurity$xCryptography.$2bisacsh
650 7 $aComputer networks$xSecurity measures.$2fast$0(OCoLC)fst00872341
650 7 $aData encryption (Computer science)$2fast$0(OCoLC)fst00887935
650 7 $aIdentification.$2fast$0(OCoLC)fst00966861
650 7 $aPublic key cryptography.$2fast$0(OCoLC)fst01082562
650 7 $aPublic key infrastructure (Computer security)$2fast$0(OCoLC)fst01082563
655 0 $aElectronic books.
655 4 $aElectronic books.
700 1 $aQin, Zhen,$d1982-$eauthor.
700 1 $aVasilakos, Athanasios,$eauthor.
776 08 $iPrint version:$aXiong, Hu.$tIntroduction to certificateless cryptography.$dBoca Raton : CRC Press, Taylor & Francis Group, [2017]$z9781482248609$w(DLC) 2016016910$w(OCoLC)895728647
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio15114661$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS