001 |
|
99714 |
020 |
|
|a9783642138577 (paper)
|
020 |
|
|a9783642138584 (electronic bk.)
|
050 |
04
|
|aQA76.9.A25|bF74 2010|cF948
|
082 |
04
|
|a005.8|222
|
090 |
|
|aQA76.9.A25|bF948 2010
|
809 |
|
|pEB|dQA76.9.A25|eF948|y2010
|
111 |
2
|
|aFSE 2010|d(2010 :|cSeoul, Korea)
|
245 |
10
|
|aFast software encryption|h[electronic resource] :|b17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010 : revised selected papers /|cedited by Seokhie Hong, Tetsu Iwata.
|
260 |
|
|aBerlin, Heidelberg :|bInternational Association for Cryptologic Research,|c2010.
|
300 |
|
|axi, 383 p. :|bill., digital ;|c24 cm.
|
440 |
0
|
|aLecture notes in computer science,|x0302-9743 ;|v6147
|
650 |
0
|
|aComputer security|vCongresses.
|
650 |
0
|
|aData encryption (Computer science)|vCongresses.
|
650 |
0
|
|aSoftware protection|vCongresses.
|
650 |
14
|
|aComputer Science.
|
650 |
24
|
|aAlgorithm Analysis and Problem Complexity.
|
650 |
24
|
|aComputer Communication Networks.
|
650 |
24
|
|aData Encryption.
|
650 |
24
|
|aDiscrete Mathematics in Computer Science.
|
650 |
24
|
|aManagement of Computing and Information Systems.
|
650 |
24
|
|aSystems and Data Security.
|
700 |
1
|
|aHong, Seokhie.
|
700 |
1
|
|aIwata, Tetsu.
|
710 |
2
|
|aSpringerLink (Online service)
|
773 |
0
|
|tSpringer eBooks
|
856 |
40
|
|uhttp://dx.doi.org/10.1007/978-3-642-13858-4
|
950 |
|
|aComputer Science (Springer-11645)
|
856 |
40
|
|uhttp://dx.doi.org/10.1007/978-3-642-13858-4
|