Applied Cryptography and Network Security [E-Book] : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings / edited by Jianying Zhou, Moti Yung.
Saved in:
Full text |
|
Personal Name(s): | Yung, Moti |
Zhou, Jianying | |
Imprint: |
Berlin, Heidelberg :
Springer-Verlag Berlin Heidelberg,
2010
|
Physical Description: |
online resource |
Note: |
englisch |
ISBN: |
9783642137082 |
Series Title: |
/* Depending on the record driver, $field may either be an array with
"name" and "number" keys or a flat string containing only the series
name. We should account for both cases to maximize compatibility. */?>
Lecture notes in computer science ;
6123 |
Subject (LOC): |
LEADER | 01168nmm a22003135u 4500 | ||
---|---|---|---|
001 | 978-3-642-13707-5 | ||
003 | Springer | ||
020 | |a 9783642137082 | ||
035 | |a (Sirsi) a211899 | ||
041 | |a eng | ||
245 | 1 | 0 | |a Applied Cryptography and Network Security |h [E-Book] : |b 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010. Proceedings / |c edited by Jianying Zhou, Moti Yung. |
260 | |a Berlin, Heidelberg : |b Springer-Verlag Berlin Heidelberg, |c 2010 |e (Springer LINK) | ||
300 | |a online resource | ||
490 | |a Lecture notes in computer science ; |v 6123 | ||
500 | |a englisch | ||
596 | |a 1 | ||
650 | 0 | |a Computational complexity | |
650 | 0 | |a Computer Communication Networks | |
650 | 0 | |a Computer science | |
650 | 0 | |a Computer software | |
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Data protection | |
650 | 0 | |a Information Systems | |
700 | 1 | |a Yung, Moti | |
700 | 1 | |a Zhou, Jianying | |
856 | 4 | 0 | |u http://dx.doi.org/10.1007/978-3-642-13708-2 |z Volltext |
908 | |a Konferenz | ||
915 | |a zzwFZJ2 | ||
949 | |a XX(211899.1) |w AUTO |c 1 |i 211899-1001 |l ELECTRONIC |m ZB |r N |s Y |t E-BOOK |u 31/8/2010 |x UNKNOWN |z UNKNOWN |1 ONLINE |2 KONFERENZ |