[{"creator":{"id":"25078","login":"feidens"},"oa":"1","date_updated":"2022-01-06T06:58:42Z","dini_type":"doc-type:other","department":[{"tree":[{"_id":"7"},{"_id":"34"},{"_id":"44"},{"_id":"43"}],"_id":"64"}],"dc":{"creator":["Liske, Gennadij"],"source":["Liske G. Analyse Und Evaluation Eines Identitätsbasierten Signcryption-Verfahrens.; 2009."],"title":["Analyse und Evaluation eines identitätsbasierten Signcryption-Verfahrens"],"identifier":["https://ris.uni-paderborn.de/record/2896","https://ris.uni-paderborn.de/download/2896/2897"],"date":["2009"],"type":["info:eu-repo/semantics/other","doc-type:other","text","http://purl.org/coar/resource_type/c_1843"],"rights":["info:eu-repo/semantics/openAccess"],"subject":["ddc:000"]},"citation":{"chicago":"Liske, Gennadij. Analyse Und Evaluation Eines Identitätsbasierten Signcryption-Verfahrens, 2009.","apa":"Liske, G. (2009). Analyse und Evaluation eines identitätsbasierten Signcryption-Verfahrens.","mla":"Liske, Gennadij. Analyse Und Evaluation Eines Identitätsbasierten Signcryption-Verfahrens. 2009.","bibtex":"@book{Liske_2009, title={Analyse und Evaluation eines identitätsbasierten Signcryption-Verfahrens}, author={Liske, Gennadij}, year={2009} }","short":"G. Liske, Analyse Und Evaluation Eines Identitätsbasierten Signcryption-Verfahrens, 2009.","ieee":"G. Liske, Analyse und Evaluation eines identitätsbasierten Signcryption-Verfahrens. 2009."},"type":"bachelorsthesis","uri_base":"https://ris.uni-paderborn.de","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}],"_id":"2896","urn":"28960","status":"public","has_accepted_license":"1","date_created":"2018-05-25T09:31:04Z","author":[{"last_name":"Liske","first_name":"Gennadij"}],"file_date_updated":"2018-07-12T09:41:46Z","file":[{"file_size":1196648,"file_id":"2897","creator":"feidens","date_updated":"2018-07-12T09:41:46Z","content_type":"application/pdf","relation":"main_file","date_created":"2018-05-25T09:30:58Z","file_name":"2009_Liske_AnalyseUndEvaluationEinesIdentitaetsbasiertenSigncryptionVerfahrens.pdf","access_level":"open_access"}],"ddc":[],"user_id":"25078"}]