{"entities":{"Q2380055":{"pageid":2390798,"ns":120,"title":"Item:Q2380055","lastrevid":72650823,"modified":"2026-04-14T06:18:11Z","type":"item","id":"Q2380055","labels":{"en":{"language":"en","value":"A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 5686484"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2380055$D805C938-C2B2-4159-83E1-B5EEE377A71A","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"2f846a662ef88923040966ab932a85a943a9d812","datavalue":{"value":{"text":"A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q2380055$D0FB7DA5-7AB8-4222-B27B-9F87DB710FBB","rank":"normal"}],"P225":[{"mainsnak":{"snaktype":"value","property":"P225","hash":"6ee9e5971be395c3c86ed8fd2e598d933f501fab","datavalue":{"value":"1255.94071","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2380055$37B1F5C7-4344-4829-A969-73F5AFC14B41","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"fc6c8886bf1fe88f1890bf65202a5e072468a300","datavalue":{"value":{"entity-type":"item","numeric-id":990102,"id":"Q990102"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2380055$47F936D5-A36A-410A-A203-A1AC62D66346","rank":"normal"}],"P200":[{"mainsnak":{"snaktype":"value","property":"P200","hash":"52fa7d44b58d0511cb8993765bd916aef86052d8","datavalue":{"value":{"entity-type":"item","numeric-id":63092,"id":"Q63092"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2380055$0CE9CBB4-A957-436C-8E8C-C531FEC5DCAA","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"2b2597d51ab54359972966267a61b08692759225","datavalue":{"value":{"time":"+2010-03-24T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q2380055$4E56A55D-CB35-4A02-A552-67F6340048A0","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"b3f5570531d36cdad95fcc8cba24a2dabc5fbbbf","datavalue":{"value":"94A60","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2380055$6987419E-8210-40E2-A384-AD75DEBBF257","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"f26f32f8f732a4fa50de5c635b21d41d7f1abed8","datavalue":{"value":"5686484","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2380055$363BAF1B-618A-4C9C-BAAF-DB6026B563FF","rank":"normal"}],"P1450":[{"mainsnak":{"snaktype":"value","property":"P1450","hash":"d54d97c9d74a7974164bd27bc3725f50a6bd71c8","datavalue":{"value":"cryptography","type":"string"},"datatype":"string"},"type":"statement","id":"Q2380055$A7B72193-0611-49E8-86C8-79DE41B877C1","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"18ec2f799060194ab9c35e16ce9eb04273a1b652","datavalue":{"value":"hierarchical access control","type":"string"},"datatype":"string"},"type":"statement","id":"Q2380055$145C3EB7-EEA3-4731-80ED-7BDB077F51D4","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P1450","hash":"feefff646df0211dd417593d6b00b78b2206f039","datavalue":{"value":"safety/security in digital systems","type":"string"},"datatype":"string"},"type":"statement","id":"Q2380055$46D87051-DCEC-48DD-96FD-448B9707422A","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2380055$18BE1734-E903-429B-8A9E-2F02B87C451C","rank":"normal"}],"P205":[{"mainsnak":{"snaktype":"value","property":"P205","hash":"dbf200d9a70d97414dd2dbffab60079c52086877","datavalue":{"value":"https://doi.org/10.1016/j.ipl.2007.08.017","type":"string"},"datatype":"url"},"type":"statement","id":"Q2380055$4D554D9E-FF5A-4750-A13E-BD5E379E5EFC","rank":"normal"}],"P388":[{"mainsnak":{"snaktype":"value","property":"P388","hash":"9083cf58ad8132520c5206da1433650f73cddc60","datavalue":{"value":"W1992855762","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2380055$3DB6563C-11E0-4120-BC8C-88952EC80A6F","rank":"normal"}],"P223":[{"mainsnak":{"snaktype":"value","property":"P223","hash":"fbad2c8b3178fc2d91d71cf9e3d0eb2a1ebed281","datavalue":{"value":{"entity-type":"item","numeric-id":1607030,"id":"Q1607030"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q2380055$950995DD-A192-45D3-A3C1-4B503F714467","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"9444c19468f2c01f21ccc839e231d79e4db9550b","datavalue":{"value":"10.1016/J.IPL.2007.08.017","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q2380055$92EF72D0-EA56-4EF0-8AB3-24C9706B42C0","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/A_secure_time-bound_hierarchical_key_assignment_scheme_based_on_RSA_public_key_cryptosystem"}}}}}