| 000 | 01432nmm a22003975u 4500 | ||
|---|---|---|---|
| 001 | 978-3-540-78523-1 | ||
| 003 | Springer | ||
| 005 | 20150124122215.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100301s2008 xx j eng d | ||
| 020 | _a9783540785248 | ||
| 100 | 1 | _aCanetti, Ran. | |
| 245 | 1 | 0 |
_aTheory of Cryptography _h[electronic resource] : _bFifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings / _cedited by Ran Canetti. |
| 260 |
_aBerlin, Heidelberg : _bSpringer-Verlag Berlin Heidelberg, _c2008. |
||
| 300 | _bv.: digital | ||
| 440 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v4948 |
|
| 650 | 0 | _aComputer science | |
| 650 | 0 | _aData protection | |
| 650 | 0 | _aData encryption (Computer science) | |
| 650 | 0 | _aComputer software | |
| 650 | 0 | _aComputational complexity | |
| 650 | 0 | _aInformation Systems | |
| 650 | 1 | 4 | _aComputer Science |
| 650 | 2 | 4 | _aData Encryption |
| 650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity |
| 650 | 2 | 4 | _aDiscrete Mathematics in Computer Science |
| 650 | 2 | 4 | _aSystems and Data Security |
| 650 | 2 | 4 | _aManagement of Computing and Information Systems |
| 650 | 2 | 4 | _aComputers and Society |
| 710 | 2 | _aSpringerLink (Online service) | |
| 773 | 0 | _tSpringer eBooks | |
| 856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-540-78524-8 |
| 912 | _aZDB-2-SCS | ||
| 912 | _aZDB-2-LNC | ||
| 999 |
_c14219 _d14219 |
||