<Record><identifier xmlns="http://purl.org/dc/elements/1.1/">URN:NBN:SI:DOC-Y8WQ2D40</identifier><date>2008</date><creator>Gu, Dawu</creator><creator>Ren, Yanli Ren</creator><relation>documents/doc/Y/URN_NBN_SI_doc-Y8WQ2D40_001.pdf</relation><relation>documents/doc/Y/URN_NBN_SI_doc-Y8WQ2D40_001.txt</relation><format format_type="issue">2</format><format format_type="volume">32</format><format format_type="type">article</format><format format_type="extent">str. 207-211</format><identifier identifier_type="ISSN">0350-5596</identifier><identifier identifier_type="COBISSID">21902375</identifier><identifier identifier_type="URN">URN:NBN:SI:doc-Y8WQ2D40</identifier><language>eng</language><publisher>Slovensko društvo Informatika</publisher><source>Informatica (Ljubljana)</source><rights>InC</rights><subject language_type_id="slv">hierarhična struktura</subject><subject language_type_id="slv">identifikacija</subject><subject language_type_id="slv">informacijski sistemi</subject><subject language_type_id="slv">kodiranje</subject><subject language_type_id="slv">kriptografski sistemi</subject><subject language_type_id="slv">metode</subject><title>Efficient hierarchical identity based encryption scheme in the standard model</title></Record>