000413782 000__ 01315cam\a2200349\a\4500 000413782 001__ 413782 000413782 005__ 20210513143923.0 000413782 006__ m\\\\\\\\u\\\\\\\\ 000413782 007__ cr\cn||||||||| 000413782 008__ 080412s2008\\\\maua\\\\sb\\\\001\0\eng\d 000413782 010__ $$z 2008297861 000413782 020__ $$z9781596932388 (hbk.) 000413782 020__ $$z1596932384 (hbk.) 000413782 035__ $$a(CaPaEBR)ebr10312939 000413782 035__ $$a(OCoLC)647824474 000413782 040__ $$aCaPaEBR$$cCaPaEBR 000413782 05014 $$aQA76.9.A25$$bM374 2008eb 000413782 1001_ $$aMartin, Luther. 000413782 24510 $$aIntroduction to identity-based encryption$$h[electronic resource] /$$cLuther Martin. 000413782 260__ $$aBoston :$$bArtech House,$$cc2008. 000413782 300__ $$axiv, 232 p. :$$bill. ;$$c24 cm. 000413782 4901_ $$aArtech House information security and privacy series 000413782 504__ $$aIncludes bibliographical references and index. 000413782 506__ $$aAccess limited to authorized users. 000413782 650_0 $$aData encryption (Computer science) 000413782 650_0 $$aPublic key cryptography. 000413782 650_0 $$aPublic key infrastructure (Computer security) 000413782 655_7 $$aElectronic books.$$2lcsh 000413782 830_0 $$aArtech House information security and privacy series. 000413782 852__ $$bebk 000413782 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10312939$$zOnline Access 000413782 909CO $$ooai:library.usi.edu:413782$$pGLOBAL_SET 000413782 980__ $$aEBOOK 000413782 980__ $$aBIB 000413782 982__ $$aEbook 000413782 983__ $$aOnline