{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q6134836","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q6134836","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q6134836","kernelVersion":"v1","immutable":true,"modified":"2026-01-02T23:31:05Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q6134836","name":"On sufficient oracles for secure computation with identifiable abort","headline":"On sufficient oracles for secure computation with identifiable abort","description":"scientific article; zbMATH DE number 7716964","url":"https://portal.mardi4nfdi.de/entity/Q6134836","datePublished":"2023-07-25","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q1656026"},{"@id":"https://portal.mardi4nfdi.de/entity/Q826290"},{"@id":"https://portal.mardi4nfdi.de/entity/Q785050"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q162374"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1007/978-3-031-14791-3_22","url":"https://doi.org/10.1007/978-3-031-14791-3_22"},"sameAs":["https://doi.org/10.1007/978-3-031-14791-3_22"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q3212258"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4343427"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4785498"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3549593"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2891474"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2874547"}]},"provenance":{"prov:generatedAtTime":"2026-01-02T23:31:05Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}