000 01497nmm a22003975u 4500
005 20210128090908.0
008 100301s2006 xx j eng d
020 _a9783540333555
050 0 4 _aQA76.9.A25
_bW66 2006
100 1 _aWon, Dong Ho.
245 1 0 _aInformation Security and Cryptology - ICISC 2005
_h[electronic resource] :
_b8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers /
_cedited by Dong Ho Won, Seungjoo Kim.
250 _a1a ed.
260 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2006.
300 _bv.: digital
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3935
650 0 _aComputer science
650 0 _aComputer Communication Networks
650 0 _aOperating systems (Computers)
650 0 _aData encryption (Computer science)
650 0 _aComputer software
650 0 _aComputational complexity
650 0 _aInformation Systems
650 1 4 _aComputer Science
650 2 4 _aData Encryption
650 2 4 _aDiscrete Mathematics in Computer Science
650 2 4 _aOperating Systems
650 2 4 _aManagement of Computing and Information Systems
650 2 4 _aAlgorithm Analysis and Problem Complexity
650 2 4 _aComputer Communication Networks
700 1 _aKim, Seungjoo.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
856 4 0 _uhttp://dx.doi.org/10.1007/11734727
942 _2lcc
_cLIE
999 _c20009
_d20009