000 01973cam a22004454a 4500
005 20250930125727.0
006 m d
007 cr cn ---ancau
008 090703s2006 flu sb 001 0 eng
010 _a2005-026036
020 _a9781584884736
020 _a1584884738
035 _a(OCoLC)ocm61479572
035 _a14100248
039 9 _y07-03-2009
_zpuitm2
040 _aUKM
042 _apcc
082 0 0 _a005.8/2
_222
090 _aQA76.9.A25
_bP42 2006
100 1 _aPei, Dingyi
_957455
245 1 0 _aAuthentication codes and combinatorial designs
_h[electronic resource] /
_cDingyi Pei
260 _aBoca Raton, FL :
_bChapman & Hall/CRC,
_c2006
440 0 _aDiscrete mathematics and its applications
500 _aAccess to 2http://www.egnetbase.com/ejournals/search/advsearch1.asp3 and type in the title. You may access the full text after you type in the advanced search screen
504 _aIncludes bibliographical references (p. 233-236) and index
650 0 _aData encryption (Computer science)
650 0 _aCryptography
650 0 _aCombinatorial designs and configurations
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/login?url=http://www.egnetbase.com/ejournals/search/advsearch1.asp
856 4 0 _3CRCnetBASE
_uhttp://www.engnetbase.com/ejournals/books/book_km.asp?id=4359
_zClick here for the electronic version
907 _a.b14532621
_b2022-04-06
_c2019-11-12
942 _n0
_kQA76.9.A25 P42 2006
914 _avtls003413074
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
990 _aaini
998 _ae
_b2009-03-07
_cm
_dz
_feng
_gflu
_y0
_z.b14532621
999 _c445487
_d445487