000 01458nmm a22003975u 4500
005 20210309111341.0
008 100301s2008 xx j eng d
020 _a9783540887331
050 0 4 _aQA76.9.A25
_bB34 2008
100 1 _aBaek, Joonsang.
245 1 0 _aProvable Security
_h[electronic resource] :
_bSecond International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings /
_cedited by Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai.
260 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2008.
300 _bv.: digital
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v5324
650 0 _aComputer science
650 0 _aData protection
650 0 _aData encryption (Computer science)
650 0 _aCoding theory
650 0 _aInformation theory
650 0 _aAlgebra
_xData processing
650 1 4 _aComputer Science
650 2 4 _aData Encryption
650 2 4 _aSystems and Data Security
650 2 4 _aCoding and Information Theory
650 2 4 _aTheory of Computation
650 2 4 _aMathematical Logic and Formal Languages
650 2 4 _aSymbolic and Algebraic Manipulation
700 1 _aBao, Feng.
700 1 _aChen, Kefei.
700 1 _aLai, Xuejia.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-540-88733-1
942 _2lcc
_cLIE
999 _c25701
_d25701