{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BD10152328.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BD10152328#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BD10152328.json"},"dc:title":[{"@value":"Finitely presented groups : with applications in post-quantum cryptography and artificial intelligence"}],"dc:creator":"edited by Volker Diekert, Martin Kreuzer","dc:publisher":[{"@value":"De Gruyter"}],"dcterms:extent":"x, 242 pages","cinii:size":"25 cm","dc:language":"eng","dc:date":"2024","cinii:ncid":"BD10152328","cinii:ownerCount":"2","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA04740508#entity","@type":"foaf:Person","foaf:name":[{"@value":"Diekert, Volker"}]},{"@type":"foaf:Person","foaf:name":[{"@value":"Kreuzer, Martin"}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA013990","@type":"foaf:Organization","foaf:name":"東京大学 数理科学研究科","rdfs:seeAlso":{"@id":"https://opac.dl.itc.u-tokyo.ac.jp/opac/opac_openurl/?ncid=BD10152328"}},{"@id":"https://ci.nii.ac.jp/library/FA002677","@type":"foaf:Organization","foaf:name":"京都大学 理学部","rdfs:seeAlso":{"@id":"https://kuline.kulib.kyoto-u.ac.jp/opac/opac_openurl/?ncid=BD10152328"}}],"prism:publicationDate":["[2024]"],"cinii:note":["Content Type: text (ncrcontent), Media Type: unmediated (ncrmedia), Carrier Type: volume (ncrcarrier)","Includes bibliographical references and index"],"dc:subject":["DC23:510","DC23:512.23"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Combinatorial+group+theory","dc:title":"Combinatorial group theory"},{"@id":"https://ci.nii.ac.jp/books/search?q=Algorithmic+group+theory","dc:title":"Algorithmic group theory"},{"@id":"https://ci.nii.ac.jp/books/search?q=Group-based+cryptography","dc:title":"Group-based cryptography"},{"@id":"https://ci.nii.ac.jp/books/search?q=Elementary+theory+of+groups","dc:title":"Elementary theory of groups"},{"@id":"https://ci.nii.ac.jp/books/search?q=Applications+of+group+theory","dc:title":"Applications of group theory"},{"@id":"https://ci.nii.ac.jp/books/search?q=Finite+groups","dc:title":"Finite groups"},{"@id":"https://ci.nii.ac.jp/books/search?q=Presentations+of+groups+%28Mathematics%29","dc:title":"Presentations of groups (Mathematics)"},{"@id":"https://ci.nii.ac.jp/books/search?q=Quantum+cryptography","dc:title":"Quantum cryptography"},{"@id":"https://ci.nii.ac.jp/books/search?q=Artificial+intelligence","dc:title":"Artificial intelligence"}],"dcterms:hasPart":[{"@id":"urn:isbn:9783111473376"}]}]}