000 01693nam a22003975a 4500
005 20250930123959.0
006 m d
007 cr nn 008maaau
008 090212s2006 gw q j eng d
020 _a9783540494973 (electronic bk.)
020 _a9783540494966 (paper)
035 _a(Springer)978-3-540-49496-6
039 9 _a200902121954
_bmuhaimin
_y04-04-2008
_zmuhaimin
050 0 0 _aQA76.9.A25
_bI554 2006
082 0 0 _a005.8
_222
090 _aQA76.9.A25
_bI61 2006
111 2 _aInternational Conference on Information and Communications Security
_n(8th :
_d2006 :
_cRaleigh, N.C.)
245 1 0 _aInformation and Communications Security (vol. # 4307)
_h[electronic resource] :
_b8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings /
_cedited by Peng Ning, Sihan Qing, Ninghui Li.
260 _aBerlin Heidelberg :
_bSpringer-Verlag GmbH.,
_c2006
300 _axiv, 558 p. :
_bill., digital ;
_c24 cm.
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4307
650 0 _aComputer security
_vcongresses.
650 0 _aTelecommunication systems
_xSecurity measures
_vCongresses.
700 1 _aNing, Peng.
700 1 _aLi, Ninghui.
700 1 _aQing, Sihan.
_956978
710 2 _aSpringerLink (Online service)
773 0 _tSpringer e-books
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://dx.doi.org/10.1007/11935308
907 _a.b14147178
_b2025-04-08
_c2019-11-12
942 _n0
_kQA76.9.A25 I61 2006
914 _avtls003372291
998 _ae
_b2008-04-04
_cm
_dz
_feng
_ggw
_y0
_z.b14147178
999 _c410697
_d410697