000 01879nam a22004575a 4500
005 20250919173924.0
006 m d
007 cr nn 008maaau
008 090218s2005 gw j eng d
020 _a9783540305767 (electronic bk.)
020 _a9783540245735 (paper)
035 _a(Springer)978-3-540-24573-5
039 9 _a200902181529
_bmuhaimin
_c200902181526
_dmuhaimin
_y02-18-2009
_zmuhaimin
050 0 0 _aQA76.9.A25
_bT473 2005
082 0 0 _a005.8
_222
090 _aQA76.9.A25
_bT396 2005
111 2 _aTheory of Cryptography Conference
_n(2nd :
_d2005 :
_cCambridge, Mass.)
245 1 0 _aTheory of Cryptography
_h[electronic resource] :
_bSecond Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings /
_cedited by Joe Kilian.
260 _aBerlin Heidelberg :
_bSpringer-Verlag GmbH.,
_c2005.
300 _axii, 619 p. :
_bill., digital ;
_c24 cm.
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3378
650 0 _aComputer security
_vcongresses.
650 0 _aCryptography
_vCongresses.
650 1 4 _aComputer Science.
650 2 4 _aAlgorithm Analysis and Problem Complexity.
650 2 4 _aComputers and Society.
650 2 4 _aData Encryption.
650 2 4 _aDiscrete Mathematics in Computer Science.
650 2 4 _aManagement of Computing and Information Systems.
650 2 4 _aOperating Systems.
700 1 _aKilian, Joe.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer e-books
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://dx.doi.org/10.1007/b106171
907 _a.b14416293
_b2024-01-24
_c2019-11-12
942 _n0
_kQA76.9.A25 T396 2005
914 _avtls003400753
998 _ae0001
_b2009-05-02
_cm
_da
_feng
_ggw
_y0
_z.b14416293
999 _c676479
_d676479