Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Theory of Cryptography :Fifth Theory...
~
(1998 :)
Theory of Cryptography :Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Theory of Cryptography :edited by Ran Canetti.
Reminder of title:
Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
other author:
Canetti, Ran.
corporate name:
Published:
Berlin, Heidelberg :Springer-Verlag Berlin Heidelberg,2008.
Description:
xii, 643 p. :ill., digital ;24 cm.
Series:
Lecture Notes in Computer Science, ;
Contained By:
Springer eBooks
Subject:
Computer securityCongresses.
Online resource:
http://dx.doi.org/10.1007/978-3-540-78524-8
ISBN:
9783540785231 (paper)
Theory of Cryptography :Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
Theory of Cryptography :
Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /[electronic resource] :edited by Ran Canetti. - Berlin, Heidelberg :Springer-Verlag Berlin Heidelberg,2008. - xii, 643 p. :ill., digital ;24 cm. - Lecture Notes in Computer Science, ;4948,0302-9743 ;.
ISBN: 9783540785231 (paper)Subjects--Topical Terms:
383239
Computer security
--Congresses.
LC Class. No.: QA76.9.A25 / T38 2008
Dewey Class. No.: 005.82
Theory of Cryptography :Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
LDR
:00997nmm _22002415a_450
001
185426
003
Springer
005
19980120105816.0
006
m d
007
cr nn 008maaau
008
090528s2008 gw j eng d
020
$a
9783540785231 (paper)
020
$a
9783540785248 (electronic bk.)
035
$a
00331074
050
0 0
$a
QA76.9.A25
$b
T38 2008
082
0 0
$2
22
$a
005.82
090
$a
QA76.9.A25
$b
T396 2008
111
0
$n
(3rd :
$d
1998 :
$c
Amsterdam, Netherlands)
$3
194767
245
1 0
$a
Theory of Cryptography :
$b
Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings /
$c
edited by Ran Canetti.
$h
[electronic resource] :
260
#
$a
Berlin, Heidelberg :
$c
2008.
$b
Springer-Verlag Berlin Heidelberg,
300
$a
xii, 643 p. :
$b
ill., digital ;
$c
24 cm.
440
0
$a
Lecture Notes in Computer Science, ;
$v
4948,
$x
0302-9743 ;
650
# 0
$a
Computer security
$v
Congresses.
$3
383239
650
# 0
$a
Cryptography
$v
Congresses.
$3
383237
650
# 0
$a
Computer Science.
$3
212513
650
# 0
$a
Algorithm Analysis and Problem Complexity.
$3
273702
650
# 0
$a
Computers and Society.
$3
273764
650
# 0
$a
Data Encryption.
$3
273765
650
# 0
$a
Discrete Mathematics in Computer Science.
$3
274791
650
# 0
$a
Management of Computing and Information Systems.
$3
274191
650
# 0
$a
Systems and Data Security.
$3
274481
700
0 #
$a
Canetti, Ran.
$3
276368
710
0 #
$a
SpringerLink (Online service)
$3
273601
773
0 #
$t
Springer eBooks
856
4 0
$u
http://libsw.nuk.edu.tw:81/login?url=http://dx.doi.org/10.1007/978-3-540-78524-8
$z
http://dx.doi.org/10.1007/978-3-540-78524-8
950
$a
Computer Science (Springer-11645; ZDB-2-SCS)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000010800
電子館藏
1圖書
電子書
EB QA76.9.A25 T396 2008
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://libsw.nuk.edu.tw:81/login?url=http://dx.doi.org/10.1007/978-3-540-78524-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login