Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2014

AUTHORS

Kunwar Singh , C. Pandu Rangan , A. K. Banerjee

ABSTRACT

At Eurocrypt 1998, Blaze, Bleumer and Strauss [8] presented a new primitive called Proxy Re-Encryption (PRE). PRE is a public key encryption which allows a semi trusted proxy to alter a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) without knowing the message. To the best of our knowledge there does not exist any lattice based identity based unidirection PRE scheme. In this paper, we have costructed lattice based identity based unidirection PRE scheme. Our scheme is noninteractive. In this scheme, we have used Micciancio and Peikert’s strong trapdoor [16] for lattices which is simple, efficient and easy to implement than [3]. More... »

PAGES

76-91

References to SciGraph publications

  • 2012. Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2012
  • 2014. Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme in INFORMATION AND COMMUNICATION TECHNOLOGY
  • 2010. An Efficient and Parallel Gaussian Sampler for Lattices in ADVANCES IN CRYPTOLOGY – CRYPTO 2010
  • 2001-12-04. An Identity Based Encryption Scheme Based on Quadratic Residues in CRYPTOGRAPHY AND CODING
  • 2011. Better Key Sizes (and Attacks) for LWE-Based Encryption in TOPICS IN CRYPTOLOGY – CT-RSA 2011
  • 2009. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems in ADVANCES IN CRYPTOLOGY - CRYPTO 2009
  • 2002. Complexity of Lattice Problems, A Cryptographic Perspective in NONE
  • 2011-04. Generating Shorter Bases for Hard Random Lattices in THEORY OF COMPUTING SYSTEMS
  • 1998. Divertible protocols and atomic proxy cryptography in ADVANCES IN CRYPTOLOGY — EUROCRYPT'98
  • 1985. Identity-Based Cryptosystems and Signature Schemes in ADVANCES IN CRYPTOLOGY
  • 2001-08-02. Identity-Based Encryption from the Weil Pairing in ADVANCES IN CRYPTOLOGY — CRYPTO 2001
  • 2013. Key-Private Proxy Re-encryption under LWE in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2013
  • 2010. Efficient Lattice (H)IBE in the Standard Model in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2010
  • Book

    TITLE

    Security, Privacy, and Applied Cryptography Engineering

    ISBN

    978-3-319-12059-1
    978-3-319-12060-7

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-319-12060-7_6

    DOI

    http://dx.doi.org/10.1007/978-3-319-12060-7_6

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1040191281


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "National Institute of Technology Tiruchirappalli", 
              "id": "https://www.grid.ac/institutes/grid.419653.c", 
              "name": [
                "Computer Science and Engineering Department, NIT Trichy, Tiruchirappalli, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Singh", 
            "givenName": "Kunwar", 
            "id": "sg:person.012446762427.04", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012446762427.04"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Computer Science and Engineering Department, IIT, Madras, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Rangan", 
            "givenName": "C. Pandu", 
            "id": "sg:person.016366027737.61", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National Institute of Technology Tiruchirappalli", 
              "id": "https://www.grid.ac/institutes/grid.419653.c", 
              "name": [
                "Mathematics Department, NIT Trichy, Tiruchirappalli, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Banerjee", 
            "givenName": "A. K.", 
            "id": "sg:person.015743327233.21", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015743327233.21"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-319-03515-4_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000963163", 
              "https://doi.org/10.1007/978-3-319-03515-4_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0054122", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003048532", 
              "https://doi.org/10.1007/bfb0054122"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006227741", 
              "https://doi.org/10.1007/978-3-642-13190-5_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006227741", 
              "https://doi.org/10.1007/978-3-642-13190-5_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/237814.237838", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006748772"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00224-010-9278-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010934851", 
              "https://doi.org/10.1007/s00224-010-9278-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19074-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013434615", 
              "https://doi.org/10.1007/978-3-642-19074-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19074-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013434615", 
              "https://doi.org/10.1007/978-3-642-19074-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014375289", 
              "https://doi.org/10.1007/3-540-44647-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-44647-8_13", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1014375289", 
              "https://doi.org/10.1007/3-540-44647-8_13"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1127345.1127346", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015718628"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45325-3_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017397429", 
              "https://doi.org/10.1007/3-540-45325-3_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-45325-3_32", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1017397429", 
              "https://doi.org/10.1007/3-540-45325-3_32"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021351160", 
              "https://doi.org/10.1007/978-3-642-14623-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-14623-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1021351160", 
              "https://doi.org/10.1007/978-3-642-14623-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-55032-4_58", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1022282546", 
              "https://doi.org/10.1007/978-3-642-55032-4_58"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1027648934", 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4615-0897-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027648934", 
              "https://doi.org/10.1007/978-1-4615-0897-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4615-0897-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027648934", 
              "https://doi.org/10.1007/978-1-4615-0897-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/3-540-39568-7_5", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1029422590", 
              "https://doi.org/10.1007/3-540-39568-7_5"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-29011-4_41", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1033795788", 
              "https://doi.org/10.1007/978-3-642-29011-4_41"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1374376.1374407", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1034725075"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03356-8_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053603939", 
              "https://doi.org/10.1007/978-3-642-03356-8_35"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2014", 
        "datePublishedReg": "2014-01-01", 
        "description": "At Eurocrypt 1998, Blaze, Bleumer and Strauss [8] presented a new primitive called Proxy Re-Encryption (PRE). PRE is a public key encryption which allows a semi trusted proxy to alter a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) without knowing the message. To the best of our knowledge there does not exist any lattice based identity based unidirection PRE scheme. In this paper, we have costructed lattice based identity based unidirection PRE scheme. Our scheme is noninteractive. In this scheme, we have used Micciancio and Peikert\u2019s strong trapdoor [16] for lattices which is simple, efficient and easy to implement than [3].", 
        "editor": [
          {
            "familyName": "Chakraborty", 
            "givenName": "Rajat Subhra", 
            "type": "Person"
          }, 
          {
            "familyName": "Matyas", 
            "givenName": "Vashek", 
            "type": "Person"
          }, 
          {
            "familyName": "Schaumont", 
            "givenName": "Patrick", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-319-12060-7_6", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": false, 
        "isPartOf": {
          "isbn": [
            "978-3-319-12059-1", 
            "978-3-319-12060-7"
          ], 
          "name": "Security, Privacy, and Applied Cryptography Engineering", 
          "type": "Book"
        }, 
        "name": "Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme", 
        "pagination": "76-91", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-319-12060-7_6"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "bf7509ebc7a677902ce9cfd5c091183ab28fb276bd9d0d741affe77e37a508f3"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1040191281"
            ]
          }
        ], 
        "publisher": {
          "location": "Cham", 
          "name": "Springer International Publishing", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-319-12060-7_6", 
          "https://app.dimensions.ai/details/publication/pub.1040191281"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T22:00", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8693_00000268.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-319-12060-7_6"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12060-7_6'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12060-7_6'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12060-7_6'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-12060-7_6'


     

    This table displays all metadata directly associated to this object as RDF triples.

    155 TRIPLES      23 PREDICATES      44 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-319-12060-7_6 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N70b8bf8b4d2d4427832c816235e51eaf
    4 schema:citation sg:pub.10.1007/3-540-39568-7_5
    5 sg:pub.10.1007/3-540-44647-8_13
    6 sg:pub.10.1007/3-540-45325-3_32
    7 sg:pub.10.1007/978-1-4615-0897-7
    8 sg:pub.10.1007/978-3-319-03515-4_1
    9 sg:pub.10.1007/978-3-642-03356-8_35
    10 sg:pub.10.1007/978-3-642-13190-5_28
    11 sg:pub.10.1007/978-3-642-14623-7_5
    12 sg:pub.10.1007/978-3-642-19074-2_21
    13 sg:pub.10.1007/978-3-642-29011-4_41
    14 sg:pub.10.1007/978-3-642-55032-4_58
    15 sg:pub.10.1007/bfb0054122
    16 sg:pub.10.1007/s00224-010-9278-3
    17 https://app.dimensions.ai/details/publication/pub.1027648934
    18 https://doi.org/10.1145/1127345.1127346
    19 https://doi.org/10.1145/1374376.1374407
    20 https://doi.org/10.1145/237814.237838
    21 schema:datePublished 2014
    22 schema:datePublishedReg 2014-01-01
    23 schema:description At Eurocrypt 1998, Blaze, Bleumer and Strauss [8] presented a new primitive called Proxy Re-Encryption (PRE). PRE is a public key encryption which allows a semi trusted proxy to alter a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) without knowing the message. To the best of our knowledge there does not exist any lattice based identity based unidirection PRE scheme. In this paper, we have costructed lattice based identity based unidirection PRE scheme. Our scheme is noninteractive. In this scheme, we have used Micciancio and Peikert’s strong trapdoor [16] for lattices which is simple, efficient and easy to implement than [3].
    24 schema:editor Nc9dc80c59b9d423998977a78b0889f09
    25 schema:genre chapter
    26 schema:inLanguage en
    27 schema:isAccessibleForFree false
    28 schema:isPartOf N37a04f6eb8404cef847211b87f48b3d8
    29 schema:name Lattice Based Identity Based Unidirectional Proxy Re-Encryption Scheme
    30 schema:pagination 76-91
    31 schema:productId N1def8147328443c994c5de587fc1ae28
    32 N6ac837bb88b644b4b630ec8ad93dd93a
    33 N7f9bb758b49b44038bc304b1516de602
    34 schema:publisher Na702eb6bcdbc4f3cb7d6b5078d69bb20
    35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1040191281
    36 https://doi.org/10.1007/978-3-319-12060-7_6
    37 schema:sdDatePublished 2019-04-15T22:00
    38 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    39 schema:sdPublisher N5374af48d42b47029d47496a4e4c9fde
    40 schema:url http://link.springer.com/10.1007/978-3-319-12060-7_6
    41 sgo:license sg:explorer/license/
    42 sgo:sdDataset chapters
    43 rdf:type schema:Chapter
    44 N12d739c924194a0f8779c3c4247c57f0 schema:familyName Schaumont
    45 schema:givenName Patrick
    46 rdf:type schema:Person
    47 N1def8147328443c994c5de587fc1ae28 schema:name doi
    48 schema:value 10.1007/978-3-319-12060-7_6
    49 rdf:type schema:PropertyValue
    50 N2181a24b59c948df8f6d5d30ef4471e8 rdf:first N12d739c924194a0f8779c3c4247c57f0
    51 rdf:rest rdf:nil
    52 N366d5ccb3fcb4f658d17b77754cb8602 schema:name Computer Science and Engineering Department, IIT, Madras, India
    53 rdf:type schema:Organization
    54 N37a04f6eb8404cef847211b87f48b3d8 schema:isbn 978-3-319-12059-1
    55 978-3-319-12060-7
    56 schema:name Security, Privacy, and Applied Cryptography Engineering
    57 rdf:type schema:Book
    58 N53325d7e23544ecda242344931e6bbed schema:familyName Chakraborty
    59 schema:givenName Rajat Subhra
    60 rdf:type schema:Person
    61 N5374af48d42b47029d47496a4e4c9fde schema:name Springer Nature - SN SciGraph project
    62 rdf:type schema:Organization
    63 N6ac837bb88b644b4b630ec8ad93dd93a schema:name readcube_id
    64 schema:value bf7509ebc7a677902ce9cfd5c091183ab28fb276bd9d0d741affe77e37a508f3
    65 rdf:type schema:PropertyValue
    66 N70b8bf8b4d2d4427832c816235e51eaf rdf:first sg:person.012446762427.04
    67 rdf:rest Nba6635dbf9c74d408b221576d3da96bd
    68 N7f9bb758b49b44038bc304b1516de602 schema:name dimensions_id
    69 schema:value pub.1040191281
    70 rdf:type schema:PropertyValue
    71 Na702eb6bcdbc4f3cb7d6b5078d69bb20 schema:location Cham
    72 schema:name Springer International Publishing
    73 rdf:type schema:Organisation
    74 Nba6635dbf9c74d408b221576d3da96bd rdf:first sg:person.016366027737.61
    75 rdf:rest Nf6b0fecbef704250a3c183ca78f504c9
    76 Nc9dc80c59b9d423998977a78b0889f09 rdf:first N53325d7e23544ecda242344931e6bbed
    77 rdf:rest Ne47e469191664a6fb9f267c69dda2472
    78 Ncadce51cc55f467289690c3e324d5b0d schema:familyName Matyas
    79 schema:givenName Vashek
    80 rdf:type schema:Person
    81 Ne47e469191664a6fb9f267c69dda2472 rdf:first Ncadce51cc55f467289690c3e324d5b0d
    82 rdf:rest N2181a24b59c948df8f6d5d30ef4471e8
    83 Nf6b0fecbef704250a3c183ca78f504c9 rdf:first sg:person.015743327233.21
    84 rdf:rest rdf:nil
    85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    86 schema:name Information and Computing Sciences
    87 rdf:type schema:DefinedTerm
    88 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    89 schema:name Data Format
    90 rdf:type schema:DefinedTerm
    91 sg:person.012446762427.04 schema:affiliation https://www.grid.ac/institutes/grid.419653.c
    92 schema:familyName Singh
    93 schema:givenName Kunwar
    94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012446762427.04
    95 rdf:type schema:Person
    96 sg:person.015743327233.21 schema:affiliation https://www.grid.ac/institutes/grid.419653.c
    97 schema:familyName Banerjee
    98 schema:givenName A. K.
    99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015743327233.21
    100 rdf:type schema:Person
    101 sg:person.016366027737.61 schema:affiliation N366d5ccb3fcb4f658d17b77754cb8602
    102 schema:familyName Rangan
    103 schema:givenName C. Pandu
    104 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61
    105 rdf:type schema:Person
    106 sg:pub.10.1007/3-540-39568-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1029422590
    107 https://doi.org/10.1007/3-540-39568-7_5
    108 rdf:type schema:CreativeWork
    109 sg:pub.10.1007/3-540-44647-8_13 schema:sameAs https://app.dimensions.ai/details/publication/pub.1014375289
    110 https://doi.org/10.1007/3-540-44647-8_13
    111 rdf:type schema:CreativeWork
    112 sg:pub.10.1007/3-540-45325-3_32 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017397429
    113 https://doi.org/10.1007/3-540-45325-3_32
    114 rdf:type schema:CreativeWork
    115 sg:pub.10.1007/978-1-4615-0897-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027648934
    116 https://doi.org/10.1007/978-1-4615-0897-7
    117 rdf:type schema:CreativeWork
    118 sg:pub.10.1007/978-3-319-03515-4_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000963163
    119 https://doi.org/10.1007/978-3-319-03515-4_1
    120 rdf:type schema:CreativeWork
    121 sg:pub.10.1007/978-3-642-03356-8_35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053603939
    122 https://doi.org/10.1007/978-3-642-03356-8_35
    123 rdf:type schema:CreativeWork
    124 sg:pub.10.1007/978-3-642-13190-5_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006227741
    125 https://doi.org/10.1007/978-3-642-13190-5_28
    126 rdf:type schema:CreativeWork
    127 sg:pub.10.1007/978-3-642-14623-7_5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021351160
    128 https://doi.org/10.1007/978-3-642-14623-7_5
    129 rdf:type schema:CreativeWork
    130 sg:pub.10.1007/978-3-642-19074-2_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013434615
    131 https://doi.org/10.1007/978-3-642-19074-2_21
    132 rdf:type schema:CreativeWork
    133 sg:pub.10.1007/978-3-642-29011-4_41 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033795788
    134 https://doi.org/10.1007/978-3-642-29011-4_41
    135 rdf:type schema:CreativeWork
    136 sg:pub.10.1007/978-3-642-55032-4_58 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022282546
    137 https://doi.org/10.1007/978-3-642-55032-4_58
    138 rdf:type schema:CreativeWork
    139 sg:pub.10.1007/bfb0054122 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003048532
    140 https://doi.org/10.1007/bfb0054122
    141 rdf:type schema:CreativeWork
    142 sg:pub.10.1007/s00224-010-9278-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010934851
    143 https://doi.org/10.1007/s00224-010-9278-3
    144 rdf:type schema:CreativeWork
    145 https://app.dimensions.ai/details/publication/pub.1027648934 schema:CreativeWork
    146 https://doi.org/10.1145/1127345.1127346 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015718628
    147 rdf:type schema:CreativeWork
    148 https://doi.org/10.1145/1374376.1374407 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034725075
    149 rdf:type schema:CreativeWork
    150 https://doi.org/10.1145/237814.237838 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006748772
    151 rdf:type schema:CreativeWork
    152 https://www.grid.ac/institutes/grid.419653.c schema:alternateName National Institute of Technology Tiruchirappalli
    153 schema:name Computer Science and Engineering Department, NIT Trichy, Tiruchirappalli, India
    154 Mathematics Department, NIT Trichy, Tiruchirappalli, India
    155 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...