{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q898046","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q898046","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q898046","kernelVersion":"v1","immutable":true,"modified":"2025-07-10T10:20:55Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q898046","name":"Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15--17, 2015. Proceedings","headline":"Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15--17, 2015. Proceedings","description":"scientific article; zbMATH DE number 6517606","url":"https://portal.mardi4nfdi.de/entity/Q898046","datePublished":"2015-12-08","publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q162374"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1007/978-3-319-27239-9","url":"https://doi.org/10.1007/978-3-319-27239-9"},"sameAs":["https://doi.org/10.1007/978-3-319-27239-9"]},"provenance":{"prov:generatedAtTime":"2025-07-10T10:20:55Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}