000 01681nom a2200421 u 4500
001 10090671
003 upatras
005 20210117202824.0
008 110802s2010 eng
020 _a9783642144233
040 _aGR-PaULI
_cGR-PaULI
041 0 _aeng
100 1 _aLee, Donghoon
_994391
245 1 0 _aInformation, Security and Cryptology – ICISC 2009
_h[electronic resource]
_b12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers
_cedited by Donghoon Lee, Seokhie Hong
260 _aBerlin, Heidelberg
_bSpringer-Verlag Berlin Heidelberg
_c2010
300 _bv.: digital
490 0 _aLecture Notes in Computer Science
_v5984
_x0302-9743
650 4 _aComputer science
_913995
650 4 _aComputer Communication Networks
_964562
650 4 _aData protection
_921658
650 4 _aData encryption (Computer science)
_964602
650 4 _aComputer software
_924488
650 4 _aComputational complexity
_920484
650 4 _aInformation Systems
_964257
650 4 _aComputer Science
_964565
650 4 _aComputer Communication Networks
_964562
650 4 _aData Encryption
_964604
650 4 _aManagement of Computing and Information Systems
_964260
650 4 _aAlgorithm Analysis and Problem Complexity
_964576
650 4 _aSystems and Data Security
_993988
650 4 _aDiscrete Mathematics in Computer Science
_964594
700 1 _aHong, Seokhie
_994392
710 2 _aSpringerLink (Online service)
_968735
760 1 _aLecture notes in computer science
_g5984
_x0302-9743
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-642-14423-3
942 _2ddc
999 _c66371
_d66371