000 01548aam a2200349 i 4500
005 20250914164851.0
006 m d
007 cr nn 008maaau
008 090212s2006 gw q j eng d
020 _a9783540494768 (electronic bk.)
035 _a(Springer)978-3-540-49475-1
039 9 _a200902121954
_bmuhaimin
_y04-04-2008
_zmuhaimin
050 0 0 _aQA76.9.A25
_bI555 2006
082 0 0 _a005.8
_222
111 2 _aInternational Conference on the Theory and Application of Cryptology and Information Security
_n(12th :
_d2006 :
_cShanghai, China)
245 1 0 _aAdvances in Cryptology -- ASIACRYPT 2006
_h[electronic resource] :
_b12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings /
_cedited by Xuejia Lai, Kefei
260 _aBerlin Heidelberg :
_bSpringer-Verlag GmbH.,
_c2006
300 _axiv, 466 p. :
_bill., digital ;
_c24 cm.
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4284
650 0 _aComputer security
_vcongresses.
700 1 _aLai, Xuejia.
700 1 _aChen, Kefei.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer e-books
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://dx.doi.org/10.1007/11935230
907 _a.b14147166
_b2024-03-06
_c2019-11-12
942 _n0
914 _avtls003372290
998 _ae0001
_b2008-04-04
_cm
_dz
_feng
_ggw
_y0
_z.b14147166
999 _c410696
_d410696