Staff View for: Cryptology and network security : 5th in

 Staff view

You must be logged in to Tag Records

Cryptology and network security : 5th international conference, CANS 2006 Suzhou, China, December 2006 : proceedings /

David Pointcheval, Yi Mu, Kefei Chen (eds.).

Book Cover
Names: Pointcheval, David. | Mu, Yi, | Chen, Kefei,
Published: Berlin ; Springer, ©2006.
Series: Lecture notes in computer science ; 4301.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Computer networks - Security measures - Congresses. | Cryptography - Congresses. | Cryptography. | Computer networks - Security measures. | Informatique.
Genres: Electronic books. | Conference papers and proceedings.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 03471cam a2200649Ia 4500
001 5732876
005 20190616220723.0
006 m o d
007 cr cn|||||||||
008 070919s2006 gw a ob 101 0 eng d
015 |aGBA6A3620|2bnb
016 7 |a013621572|2Uk
019 |a316433127|a516121767|a696923378|a739145273|a880104022|a964921134|a1005762486|a1044309138|a1044355917|a1056371279|a1056390722|a1073054711|a1081188531|a1087341195
020 |a9783540494638
020 |a3540494634
020 |a9783540494621|q(softcover ;|qalk. paper)
020 |a3540494626|q(softcover ;|qalk. paper)
024 8 |a9786611389307
035 |a(OCoLC)ocn262693503
035 |a(RMCdb)224102
037 |a978-3-540-49462-1|bSpringer|nhttp://www.springerlink.com
040 |aGW5XE|beng|epn|cGW5XE|dUAB|dYNG|dOCLCQ|dREB|dOCLCQ|dOCLCF|dBEDGE|dITD|dOCLCO|dIDEBK|dSLY|dOCLCO|dOCLCQ|dOCLCO|dOCL|dOCLCO|dOCLCQ|dVT2|dOCLCA|dOCLCQ|dESU|dU3W|dBUF|dCEF|dTFW|dWYU|dICG|dMERER|dYOU|dOCLCQ|dOL$|dOCLCQ|dRMCdb
049 |aJVQA
050 4|aQA76.9.A25|bI5538 2006
082 04|a005.8|222
084 |aTP309-532|2clc
111 2 |aInternational Conference on Cryptology and Network Security|n(5th :|d2006 :|cSuzhou, Jiangsu Sheng, China)
245 10|aCryptology and network security :|b5th international conference, CANS 2006 Suzhou, China, December 2006 : proceedings /|cDavid Pointcheval, Yi Mu, Kefei Chen (eds.).
246 30|aCANS 2006
260 |aBerlin ;|aNew York ;|a[London] :|bSpringer,|c©2006.
300 |a1 online resource (xiii, 380 pages) :|billustrations
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
490 1 |aLecture notes in computer science,|x0302-9743 ;|v4301
490 1 |aLNCS sublibrary. SL 4, Security and cryptology
504 |aIncludes bibliographical references and index.
505 0 |aEncryption -- Key exchange -- Authentication and signatures -- Proxy signatures -- Cryptanalysis -- Implementation -- Steganalysis and watermarking -- Boolean functions and stream ciphers -- Intrusion detection -- Disponsibility and reliability.
588 0 |aPrint version record.
590 |aOCLC|bWorldCat Holdings
650 0|aComputer networks|xSecurity measures|vCongresses.
650 0|aCryptography|vCongresses.
650 07|aCryptography.|2cct
650 07|aComputer networks|xSecurity measures.|2cct
650 7|aInformatique.|2eclas
650 7|aComputer networks|xSecurity measures.|2fast|0(OCoLC)fst00872341
650 7|aCryptography.|2fast|0(OCoLC)fst00884552
655 4|aElectronic books.
655 7|aConference papers and proceedings.|2fast|0(OCoLC)fst01423772
700 1 |aPointcheval, David.
700 1 |aMu, Yi,|d1955-
700 1 |aChen, Kefei,|d1959-
776 08|iPrint version:|aInternational Conference on Cryptology and Network Security (5th : 2006 : Suzhou, Jiangsu Sheng, China).|tCryptology and network security.|dBerlin ; New York ; [London] : Springer, ©2006|z9783540494621|z3540494626|w(DLC) 2006937156|w(OCoLC)77011958
830 0|aLecture notes in computer science ;|v4301.|x0302-9743
830 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology.
856 40|3SpringerLink|uhttp://library.robertmorris.edu:2048/login?url=http://dx.doi.org/10.1007/11935070|zAvailable to current RMU students, faculty, and staff. Click here for full text.
994 |a92|bJVQ

Staff View for: Cryptology and network security : 5th in