{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BB27379684.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BB27379684#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BB27379684.json"},"dc:title":[{"@value":"Advances in cryptology - EUROCRYPT 2018 : 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 : proceedings"}],"dc:creator":"Jesper Buus Nielsen, Vincent Rijmen (eds.)","dc:publisher":[{"@value":"Springer"}],"dcterms:extent":"3 v.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2018","cinii:ncid":"BB27379684","cinii:ownerCount":"2","foaf:maker":[{"@type":"foaf:Person","foaf:name":[{"@value":"Nielsen, Jesper Buus"}]},{"@id":"https://ci.nii.ac.jp/author/DA11915554#entity","@type":"foaf:Person","foaf:name":[{"@value":"Rijmen, Vincent"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA002236","@type":"foaf:Organization","foaf:name":"福井大学 附属図書館","rdfs:seeAlso":{"@id":"https://karin.flib.u-fukui.ac.jp/opac/search?target=local&searchmode=complex&autoDetail=true&s_ncid=BB27379684"}},{"@id":"https://ci.nii.ac.jp/library/FA003760","@type":"foaf:Organization","foaf:name":"東京都立大学 図書館","rdfs:seeAlso":{"@id":"https://opactmu.lib.tmu.ac.jp/iwjs0013opc/ufirdi.do?ufi_target=ctlsrh&ncid=BB27379684"}}],"bibo:lccn":["2018937382"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2018937382"}],"prism:publicationDate":["c2018"],"cinii:note":["Includes bibliographical references and author index","\"International Association for Cryptologic Research\"--Cover"],"dc:subject":["DC23:005.824"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Computers+--+Access+control+--+Congresses","dc:title":"Computers -- Access control -- Congresses"},{"@id":"https://ci.nii.ac.jp/books/search?q=Data+encryption+%28Computer+science%29+--+Congresses","dc:title":"Data encryption (Computer science) -- Congresses"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+Congresses","dc:title":"Computer security -- Congresses"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cryptography+--+Congresses","dc:title":"Cryptography -- Congresses"}],"dcterms:isPartOf":[{"@id":"https://ci.nii.ac.jp/ncid/BA00009279#entity","dc:title":"Lecture notes in computer science, 10820-10822 . LNCS sublibrary ; SL 4 . Security and cryptology","@type":"bibo:Book"}],"dcterms:hasPart":[{"@id":"urn:isbn:9783319783802","dc:title":"pt. 1"},{"@id":"urn:isbn:9783319783741","dc:title":"pt. 2"},{"@id":"urn:isbn:9783319783710","dc:title":"pt. 3"}]}]}