001 |
|
99699 |
020 |
|
|a9783642137075 (paper)
|
020 |
|
|a9783642137082 (electronic bk.)
|
050 |
04
|
|aQA76.9.A25|bA26 2010|cA184
|
082 |
04
|
|a005.8|222
|
090 |
|
|aQA76.9.A25|bA184 2010
|
809 |
|
|pEB|dQA76.9.A25|eA184|y2010
|
111 |
2
|
|aACNS 2010|d(2010 :|cBeijing, China)
|
245 |
10
|
|aApplied cryptography and network security|h[electronic resource] :|b8th international conference, ACNS 2010, Beijing, China, June 22-25, 2010 : proceedings /|cedited by Jianying Zhou, Moti Yung.
|
260 |
|
|aBerlin, Heidelberg :|bSpringer-Verlag Berlin Heidelberg,|c2010.
|
300 |
|
|axiii, 564 p. :|bill., digital ;|c24 cm.
|
440 |
0
|
|aLecture notes in computer science,|x0302-9743 ;|v6123
|
650 |
0
|
|aComputer networks|xAccess control|vCongresses.
|
650 |
0
|
|aComputer networks|xSecurity measures|vCongresses.
|
650 |
0
|
|aData encryption (Computer science)|vCongresses.
|
650 |
14
|
|aComputer Science.
|
650 |
24
|
|aAlgorithm Analysis and Problem Complexity.
|
650 |
24
|
|aComputer Communication Networks.
|
650 |
24
|
|aData Encryption.
|
650 |
24
|
|aDiscrete Mathematics in Computer Science.
|
650 |
24
|
|aManagement of Computing and Information Systems.
|
650 |
24
|
|aSystems and Data Security.
|
700 |
1
|
|aYung, Moti.
|
700 |
1
|
|aZhou, Jianying.
|
710 |
2
|
|aSpringerLink (Online service)
|
773 |
0
|
|tSpringer eBooks
|
856 |
40
|
|uhttp://dx.doi.org/10.1007/978-3-642-13708-2
|
950 |
|
|aComputer Science (Springer-11645)
|
856 |
40
|
|uhttp://dx.doi.org/10.1007/978-3-642-13708-2
|