000 | 00981 a2200265 4500 | ||
---|---|---|---|
001 | 331293 | ||
003 | OSt | ||
005 | 20240722173553.0 | ||
008 | 240722b |||||||| |||| 00| 0 eng d | ||
020 | _a978-3-642-25283-9 | ||
040 | _cIITB | ||
041 | _aeng | ||
245 | _aTrusted systems : second international conference, INTRUST, Beijing, China, Dec. 13-15, 2010 (e-book) | ||
260 |
_aBerlin _cSpringer _b2011 |
||
440 |
_922935 _aLecture Notes in Computer Science (LNCS) _vv.6802 |
||
440 |
_945005 _aLNCS Sublibrary : SL 4 – Security and cryptology |
||
650 | 0 |
_aComputer science and engineering _97673 |
|
650 | 0 |
_aComputer security _vCongresses _96232 |
|
650 | 0 |
_aData encryption (Computer science) _vCongresses _96359 |
|
650 | 0 |
_aComputer networks _xSecurity measures _vCongresses _96234 |
|
700 |
_aChen, Liqun _eEditor _940048 |
||
700 |
_aYung, Moti _eEditor _97151 |
||
856 | _uhttps://link.springer.com/book/10.1007/978-3-642-25283-9 | ||
942 |
_cEB _2udc |
||
999 |
_c175643 _d175644 |