{"entities":{"Q6942819":{"pageid":21160521,"ns":120,"title":"Item:Q6942819","lastrevid":75937242,"modified":"2026-04-21T14:49:08Z","type":"item","id":"Q6942819","labels":{"en":{"language":"en","value":"Secure computation meets distributed universal optimality"}},"descriptions":{"en":{"language":"en","value":"scientific article; zbMATH DE number 8080160"}},"aliases":{},"claims":{"P31":[{"mainsnak":{"snaktype":"value","property":"P31","hash":"fd5912e4dab4b881a8eb0eb27e7893fef55176ad","datavalue":{"value":{"entity-type":"item","numeric-id":56887,"id":"Q56887"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6942819$7F479D29-0C68-47BF-B76A-1AA3AFE45D0A","rank":"normal"}],"P159":[{"mainsnak":{"snaktype":"value","property":"P159","hash":"3c2aa24571b2fec0e5ccc8ae890b311daa3d50af","datavalue":{"value":{"text":"Secure computation meets distributed universal optimality","language":"en"},"type":"monolingualtext"},"datatype":"monolingualtext"},"type":"statement","id":"Q6942819$39FFFA77-C5A9-48EA-BD6D-0B48967741CE","rank":"normal"}],"P27":[{"mainsnak":{"snaktype":"value","property":"P27","hash":"8af2cc6696e7a0df84f13aaa49533f40577198b2","datavalue":{"value":"10.1109/FOCS57990.2023.00144","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6942819$ADFD603D-4512-40AD-ADD3-3016CDF4BB67","rank":"normal"}],"P16":[{"mainsnak":{"snaktype":"value","property":"P16","hash":"a5e7d33a4638268d113de2abb760a7c1253e35b0","datavalue":{"value":{"entity-type":"item","numeric-id":831781,"id":"Q831781"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6942819$2F3096B8-620D-47E0-B68D-D0DE18C326CA","rank":"normal"}],"P28":[{"mainsnak":{"snaktype":"value","property":"P28","hash":"c353c511b4dc13ecee102b336a2664d881fe8b6f","datavalue":{"value":{"time":"+2025-08-15T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q6942819$9297CFA2-E3BC-4CBF-892D-93706B654244","rank":"normal"}],"P226":[{"mainsnak":{"snaktype":"value","property":"P226","hash":"ed293b811733fa9438a72e1b6ba5680a0d2aac9e","datavalue":{"value":"68-06","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6942819$43004935-66F3-479A-9B56-B9B9F75E4251","rank":"normal"}],"P1451":[{"mainsnak":{"snaktype":"value","property":"P1451","hash":"3c24ae7048ed524419d49541fd0ab76321ac23ac","datavalue":{"value":"8080160","type":"string"},"datatype":"external-id"},"type":"statement","id":"Q6942819$9F1A505A-F690-4E7D-B905-049D6238E8A1","rank":"normal"}],"P1460":[{"mainsnak":{"snaktype":"value","property":"P1460","hash":"57f7fea50d2ce1b39b695c4a1313582eed405e38","datavalue":{"value":{"entity-type":"item","numeric-id":5976449,"id":"Q5976449"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q6942819$F83D8261-646B-4B75-8F41-8AB6845D829F","rank":"normal"}]},"sitelinks":{"mardi":{"site":"mardi","title":"Secure computation meets distributed universal optimality","badges":[],"url":"https://portal.mardi4nfdi.de/wiki/Secure_computation_meets_distributed_universal_optimality"}}}}}