An Application of Partial Homomorphic Encryption in Computer System with Limited Resources
Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and process...
Ausführliche Beschreibung
Autor*in: |
Dejan Savić [verfasserIn] Dejan Simić [verfasserIn] Mladen Veinović [verfasserIn] Mladen Trikoš [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2018 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: Tehnički Vjesnik - Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017, 25(2018), 3, Seite 709-713 |
---|---|
Übergeordnetes Werk: |
volume:25 ; year:2018 ; number:3 ; pages:709-713 |
Links: |
---|
Katalog-ID: |
DOAJ063338394 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ063338394 | ||
003 | DE-627 | ||
005 | 20230309030227.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230228s2018 xx |||||o 00| ||eng c | ||
035 | |a (DE-627)DOAJ063338394 | ||
035 | |a (DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TA1-2040 | |
100 | 0 | |a Dejan Savić |e verfasserin |4 aut | |
245 | 1 | 3 | |a An Application of Partial Homomorphic Encryption in Computer System with Limited Resources |
264 | 1 | |c 2018 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. | ||
650 | 4 | |a cloud computing | |
650 | 4 | |a homomorphic encryption | |
650 | 4 | |a limited resources | |
650 | 4 | |a partial homomorphic encryption | |
653 | 0 | |a Engineering (General). Civil engineering (General) | |
700 | 0 | |a Dejan Simić |e verfasserin |4 aut | |
700 | 0 | |a Mladen Veinović |e verfasserin |4 aut | |
700 | 0 | |a Mladen Trikoš |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t Tehnički Vjesnik |d Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017 |g 25(2018), 3, Seite 709-713 |w (DE-627)603490964 |w (DE-600)2502144-8 |x 18486339 |7 nnns |
773 | 1 | 8 | |g volume:25 |g year:2018 |g number:3 |g pages:709-713 |
856 | 4 | 0 | |u https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d |z kostenfrei |
856 | 4 | 0 | |u https://hrcak.srce.hr/file/298223 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/1330-3651 |y Journal toc |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/1848-6339 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2108 | ||
912 | |a GBV_ILN_2119 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 25 |j 2018 |e 3 |h 709-713 |
author_variant |
d s ds d s ds m v mv m t mt |
---|---|
matchkey_str |
article:18486339:2018----::nplctooprilooopiecytoicmuess |
hierarchy_sort_str |
2018 |
callnumber-subject-code |
TA |
publishDate |
2018 |
allfields |
(DE-627)DOAJ063338394 (DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d DE-627 ger DE-627 rakwb eng TA1-2040 Dejan Savić verfasserin aut An Application of Partial Homomorphic Encryption in Computer System with Limited Resources 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. cloud computing homomorphic encryption limited resources partial homomorphic encryption Engineering (General). Civil engineering (General) Dejan Simić verfasserin aut Mladen Veinović verfasserin aut Mladen Trikoš verfasserin aut In Tehnički Vjesnik Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017 25(2018), 3, Seite 709-713 (DE-627)603490964 (DE-600)2502144-8 18486339 nnns volume:25 year:2018 number:3 pages:709-713 https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d kostenfrei https://hrcak.srce.hr/file/298223 kostenfrei https://doaj.org/toc/1330-3651 Journal toc kostenfrei https://doaj.org/toc/1848-6339 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_2055 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 25 2018 3 709-713 |
spelling |
(DE-627)DOAJ063338394 (DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d DE-627 ger DE-627 rakwb eng TA1-2040 Dejan Savić verfasserin aut An Application of Partial Homomorphic Encryption in Computer System with Limited Resources 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. cloud computing homomorphic encryption limited resources partial homomorphic encryption Engineering (General). Civil engineering (General) Dejan Simić verfasserin aut Mladen Veinović verfasserin aut Mladen Trikoš verfasserin aut In Tehnički Vjesnik Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017 25(2018), 3, Seite 709-713 (DE-627)603490964 (DE-600)2502144-8 18486339 nnns volume:25 year:2018 number:3 pages:709-713 https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d kostenfrei https://hrcak.srce.hr/file/298223 kostenfrei https://doaj.org/toc/1330-3651 Journal toc kostenfrei https://doaj.org/toc/1848-6339 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_2055 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 25 2018 3 709-713 |
allfields_unstemmed |
(DE-627)DOAJ063338394 (DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d DE-627 ger DE-627 rakwb eng TA1-2040 Dejan Savić verfasserin aut An Application of Partial Homomorphic Encryption in Computer System with Limited Resources 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. cloud computing homomorphic encryption limited resources partial homomorphic encryption Engineering (General). Civil engineering (General) Dejan Simić verfasserin aut Mladen Veinović verfasserin aut Mladen Trikoš verfasserin aut In Tehnički Vjesnik Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017 25(2018), 3, Seite 709-713 (DE-627)603490964 (DE-600)2502144-8 18486339 nnns volume:25 year:2018 number:3 pages:709-713 https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d kostenfrei https://hrcak.srce.hr/file/298223 kostenfrei https://doaj.org/toc/1330-3651 Journal toc kostenfrei https://doaj.org/toc/1848-6339 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_2055 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 25 2018 3 709-713 |
allfieldsGer |
(DE-627)DOAJ063338394 (DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d DE-627 ger DE-627 rakwb eng TA1-2040 Dejan Savić verfasserin aut An Application of Partial Homomorphic Encryption in Computer System with Limited Resources 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. cloud computing homomorphic encryption limited resources partial homomorphic encryption Engineering (General). Civil engineering (General) Dejan Simić verfasserin aut Mladen Veinović verfasserin aut Mladen Trikoš verfasserin aut In Tehnički Vjesnik Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017 25(2018), 3, Seite 709-713 (DE-627)603490964 (DE-600)2502144-8 18486339 nnns volume:25 year:2018 number:3 pages:709-713 https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d kostenfrei https://hrcak.srce.hr/file/298223 kostenfrei https://doaj.org/toc/1330-3651 Journal toc kostenfrei https://doaj.org/toc/1848-6339 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_2055 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 25 2018 3 709-713 |
allfieldsSound |
(DE-627)DOAJ063338394 (DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d DE-627 ger DE-627 rakwb eng TA1-2040 Dejan Savić verfasserin aut An Application of Partial Homomorphic Encryption in Computer System with Limited Resources 2018 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. cloud computing homomorphic encryption limited resources partial homomorphic encryption Engineering (General). Civil engineering (General) Dejan Simić verfasserin aut Mladen Veinović verfasserin aut Mladen Trikoš verfasserin aut In Tehnički Vjesnik Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017 25(2018), 3, Seite 709-713 (DE-627)603490964 (DE-600)2502144-8 18486339 nnns volume:25 year:2018 number:3 pages:709-713 https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d kostenfrei https://hrcak.srce.hr/file/298223 kostenfrei https://doaj.org/toc/1330-3651 Journal toc kostenfrei https://doaj.org/toc/1848-6339 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_2055 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 25 2018 3 709-713 |
language |
English |
source |
In Tehnički Vjesnik 25(2018), 3, Seite 709-713 volume:25 year:2018 number:3 pages:709-713 |
sourceStr |
In Tehnički Vjesnik 25(2018), 3, Seite 709-713 volume:25 year:2018 number:3 pages:709-713 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
cloud computing homomorphic encryption limited resources partial homomorphic encryption Engineering (General). Civil engineering (General) |
isfreeaccess_bool |
true |
container_title |
Tehnički Vjesnik |
authorswithroles_txt_mv |
Dejan Savić @@aut@@ Dejan Simić @@aut@@ Mladen Veinović @@aut@@ Mladen Trikoš @@aut@@ |
publishDateDaySort_date |
2018-01-01T00:00:00Z |
hierarchy_top_id |
603490964 |
id |
DOAJ063338394 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ063338394</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309030227.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ063338394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TA1-2040</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Dejan Savić</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An Application of Partial Homomorphic Encryption in Computer System with Limited Resources</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2018</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">homomorphic encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">limited resources</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">partial homomorphic encryption</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Engineering (General). Civil engineering (General)</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Dejan Simić</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Mladen Veinović</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Mladen Trikoš</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Tehnički Vjesnik</subfield><subfield code="d">Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017</subfield><subfield code="g">25(2018), 3, Seite 709-713</subfield><subfield code="w">(DE-627)603490964</subfield><subfield code="w">(DE-600)2502144-8</subfield><subfield code="x">18486339</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:25</subfield><subfield code="g">year:2018</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:709-713</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://hrcak.srce.hr/file/298223</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1330-3651</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1848-6339</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">25</subfield><subfield code="j">2018</subfield><subfield code="e">3</subfield><subfield code="h">709-713</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Dejan Savić |
spellingShingle |
Dejan Savić misc TA1-2040 misc cloud computing misc homomorphic encryption misc limited resources misc partial homomorphic encryption misc Engineering (General). Civil engineering (General) An Application of Partial Homomorphic Encryption in Computer System with Limited Resources |
authorStr |
Dejan Savić |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)603490964 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TA1-2040 |
illustrated |
Not Illustrated |
issn |
18486339 |
topic_title |
TA1-2040 An Application of Partial Homomorphic Encryption in Computer System with Limited Resources cloud computing homomorphic encryption limited resources partial homomorphic encryption |
topic |
misc TA1-2040 misc cloud computing misc homomorphic encryption misc limited resources misc partial homomorphic encryption misc Engineering (General). Civil engineering (General) |
topic_unstemmed |
misc TA1-2040 misc cloud computing misc homomorphic encryption misc limited resources misc partial homomorphic encryption misc Engineering (General). Civil engineering (General) |
topic_browse |
misc TA1-2040 misc cloud computing misc homomorphic encryption misc limited resources misc partial homomorphic encryption misc Engineering (General). Civil engineering (General) |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Tehnički Vjesnik |
hierarchy_parent_id |
603490964 |
hierarchy_top_title |
Tehnički Vjesnik |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)603490964 (DE-600)2502144-8 |
title |
An Application of Partial Homomorphic Encryption in Computer System with Limited Resources |
ctrlnum |
(DE-627)DOAJ063338394 (DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d |
title_full |
An Application of Partial Homomorphic Encryption in Computer System with Limited Resources |
author_sort |
Dejan Savić |
journal |
Tehnički Vjesnik |
journalStr |
Tehnički Vjesnik |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2018 |
contenttype_str_mv |
txt |
container_start_page |
709 |
author_browse |
Dejan Savić Dejan Simić Mladen Veinović Mladen Trikoš |
container_volume |
25 |
class |
TA1-2040 |
format_se |
Elektronische Aufsätze |
author-letter |
Dejan Savić |
author2-role |
verfasserin |
title_sort |
application of partial homomorphic encryption in computer system with limited resources |
callnumber |
TA1-2040 |
title_auth |
An Application of Partial Homomorphic Encryption in Computer System with Limited Resources |
abstract |
Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. |
abstractGer |
Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. |
abstract_unstemmed |
Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2003 GBV_ILN_2014 GBV_ILN_2055 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
3 |
title_short |
An Application of Partial Homomorphic Encryption in Computer System with Limited Resources |
url |
https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d https://hrcak.srce.hr/file/298223 https://doaj.org/toc/1330-3651 https://doaj.org/toc/1848-6339 |
remote_bool |
true |
author2 |
Dejan Simić Mladen Veinović Mladen Trikoš |
author2Str |
Dejan Simić Mladen Veinović Mladen Trikoš |
ppnlink |
603490964 |
callnumber-subject |
TA - General and Civil Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
callnumber-a |
TA1-2040 |
up_date |
2024-07-03T17:09:20.333Z |
_version_ |
1803578570531930112 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ063338394</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230309030227.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230228s2018 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ063338394</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJaef0444fd1b6488d8a145f4f44a08d1d</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TA1-2040</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Dejan Savić</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An Application of Partial Homomorphic Encryption in Computer System with Limited Resources</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2018</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Mathematical calculation over ciphertext during homomorphic encryption makes result of the calculation in a form of ciphertext. Obtained result can be decrypted with an appropriate key for further usage. In the era of cloud computing, this feature can be used to solve problems of storing and processing sensitive data in the cloud. Also, use of homomorphic encryption keeps both, data and results of processing, highly secured at the same time. Considering the overwhelming presence of computers with limited resources, the presence of the Internet and the ultimate practical need for use of cloud and its resources, in this paper we explored and presented the characteristics of a practical use of partial homomorphic encryption and its processing of ciphertext in the cloud on computer system with limited resources.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cloud computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">homomorphic encryption</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">limited resources</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">partial homomorphic encryption</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Engineering (General). Civil engineering (General)</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Dejan Simić</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Mladen Veinović</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Mladen Trikoš</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">Tehnički Vjesnik</subfield><subfield code="d">Faculty of Mechanical Engineering in Slavonski Brod, Faculty of Electrical Engineering in Osijek, Faculty of Civil Engineering in Osijek, 2017</subfield><subfield code="g">25(2018), 3, Seite 709-713</subfield><subfield code="w">(DE-627)603490964</subfield><subfield code="w">(DE-600)2502144-8</subfield><subfield code="x">18486339</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:25</subfield><subfield code="g">year:2018</subfield><subfield code="g">number:3</subfield><subfield code="g">pages:709-713</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/aef0444fd1b6488d8a145f4f44a08d1d</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://hrcak.srce.hr/file/298223</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1330-3651</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1848-6339</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">25</subfield><subfield code="j">2018</subfield><subfield code="e">3</subfield><subfield code="h">709-713</subfield></datafield></record></collection>
|
score |
7.399852 |