Information security and privacy. Proceedings: Third Australasian conference : ACISP' 98. Brisbane, Australia. 13.- 15. July 1999
Salvato in:
| Altri autori: | , |
|---|---|
| Natura: | Libro |
| Lingua: | inglese |
| Pubblicazione: |
Berlin :
Springer Verlag,
1998
|
| Serie: | Lecture Notes in Computer Science
1438 |
| Soggetti: | |
| Tags: |
Nessun Tag, puoi essere il primo ad aggiungerne!!
|
MARC
| LEADER | 00000nam a22000003a 4500 | ||
|---|---|---|---|
| 001 | stu51091 | ||
| 005 | 20150617225709.5 | ||
| 008 | 991126s1998----gw------------------eng-d | ||
| 020 | |a 3-540-64732-5 | ||
| 040 | |a STU |b slo | ||
| 041 | 0 | |a eng | |
| 044 | |a gw | ||
| 080 | |a 681.325.04 | ||
| 080 | |a 519.72 | ||
| 080 | |a 061.3(08) | ||
| 084 | |a B6120B |2 INS |7 stu_us_auth*stu6506 | ||
| 084 | |a B6150M |2 INS | ||
| 084 | |a B6210L |2 INS | ||
| 084 | |a C1260 |2 INS |7 stu_us_auth*stu7143 | ||
| 084 | |a C5640 |2 INS | ||
| 084 | |a C6130S |2 INS | ||
| 100 | 1 | |a Boyd, Colin |4 com | |
| 245 | 1 | |a Information security and privacy. Proceedings: Third Australasian conference : |b ACISP' 98. Brisbane, Australia. 13.- 15. July 1999 | |
| 260 | |a Berlin : |b Springer Verlag, |c 1998 | ||
| 300 | |a 422 s | ||
| 650 | 7 | |a kryptoanalýza |2 stusub | |
| 650 | 7 | |a kryptografia |2 stusub | |
| 650 | 7 | |a kryptológia |2 stusub | |
| 650 | 7 | |a kryptosystémy |2 stusub | |
| 650 | 7 | |a verejné kľúčovacie systémy |2 stusub | |
| 650 | 7 | |a tajné kľúčovacie systémy |2 stusub | |
| 650 | 7 | |a riadenie prístupu |2 stusub | |
| 650 | 7 | |a ochrana dát |2 stusub | |
| 650 | 7 | |a komunikačné protokoly |2 stusub | |
| 650 | 7 | |a teória informácie |2 stusub | |
| 700 | 1 | |a Dawson, Ed |4 com | |
| 830 | 0 | |a Lecture Notes in Computer Science |v 1438 | |
| 996 | |b 284EK82936 |c E*82936 |l EE22 |s P |a 0 |w stu51091_0001 | ||