Staff View for: Applied cryptography and network securit

 Staff view

You must be logged in to Tag Records

Applied cryptography and network security [electronic resource] : 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings /

Jianying Zhou, Moti Yung, Feng Bao (eds.).

Book Cover
Names: Zhou, Jianying. | Yung, Moti. | Bao, Feng.
Published: Berlin ; Springer, c2006.
Series: Lecture notes in computer science, 3989
Topics: Telecommunication - Security measures - Congresses. | Data encryption (Computer science) - Congresses. | Cryptography - Congresses. | Télécommunications - Sécurité - Mesures - Congrès. | Chiffrement (Informatique) - Congrès. | Cryptographie - Congrès.
Genres: Electronic books.
Online Access: SpringerLink Link to Applied cryptography and network security (access limited to Benedictine University patrons)
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 02185cam a2200493Ia 4500
001 209528
003 BENdb
005 20190801184336.0
006 m d
007 cr cn|
008 081017s2006 gw a sb 101 0 eng d
020 |a9783540347040
020 |a3540347046
035 |a(OCoLC)ocn262693156
035 |aLinkResolver
037 |a978-3-540-34703-3|bSpringer|nhttp://www.springerlink.com
040 |aGW5XE|beng|cGW5XE|dBENdb
049 |aILLA
050 14|aTK5102.94|b.A28 2006eb
072 7|aQA|2lcco
082 04|a005.8|222
111 2 |aACNS 2006|d(2006 :|cSingapore)
245 10|aApplied cryptography and network security|h[electronic resource] :|b4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings /|cJianying Zhou, Moti Yung, Feng Bao (eds.).
246 30|aACNS 2006
260 |aBerlin ;|aNew York :|bSpringer,|cc2006.
300 |axiv, 488 p. :|bill. ;|c24 cm.
440 0|aLecture notes in computer science,|x0302-9743 ;|v3989
504 |aIncludes bibliographical references and index.
533 |aElectronic reproduction.|bNew York :|cSpringer,|d2008.|nMode of access: World Wide Web.|nSystem requirements: Web browser.|nTitle from title screen (viewed on Oct. 10, 2008).|nAccess may be restricted to users at subscribing institutions.
650 0|aTelecommunication|xSecurity measures|vCongresses.
650 0|aData encryption (Computer science)|vCongresses.
650 0|aCryptography|vCongresses.
650 6|aTélécommunications|xSécurité|xMesures|vCongrès.
650 6|aChiffrement (Informatique)|vCongrès.
650 6|aCryptographie|vCongrès.
655 0|aElectronic books.
700 1 |aZhou, Jianying.
700 1 |aYung, Moti.
700 1 |aBao, Feng.
710 2 |aSpringerLink (Online service)
776 1 |cOriginal|z3540347038|z9783540347033|w(DLC) 2006926666|w(OCoLC)69983713
852 80|beitem|hSpringer|t1
856 40|3SpringerLink|uhttp://libweb.ben.edu/login?source=opac&url=http://dx.doi.org/10.1007/11767480|yLink to Applied cryptography and network security|z(access limited to Benedictine University patrons)
994 |a92|bILL

Staff View for: Applied cryptography and network securit