{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q615208","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q615208","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q615208","kernelVersion":"v1","immutable":true,"modified":"2026-01-16T23:44:26Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q615208","name":"Distributed certificateless key encapsulation mechanism secure against the adaptive adversary","headline":"Distributed certificateless key encapsulation mechanism secure against the adaptive adversary","description":"scientific article; zbMATH DE number 5832571","url":"https://portal.mardi4nfdi.de/entity/Q615208","datePublished":"2011-01-05","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q407485"},{"@id":"https://portal.mardi4nfdi.de/entity/Q615207"},{"@id":"https://portal.mardi4nfdi.de/entity/Q407491"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1028367"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q407428"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1007/S12204-009-0102-7","url":"https://doi.org/10.1007/S12204-009-0102-7"},"sameAs":["https://doi.org/10.1007/S12204-009-0102-7"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q4941850"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2974478"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4706220"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5902399"},{"@id":"https://portal.mardi4nfdi.de/entity/Q3050283"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4249624"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4474184"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4037497"}]},"provenance":{"prov:generatedAtTime":"2026-01-16T23:44:26Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}