*001131453
*00520250613104409.0
*007ta
*008110819s2006 gw 100 u eng d
*00901884cam a2200373 c 4500
*019 $bl
*020 $a3540496084$qh.
*020 $a9783540496083$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990701932314702201
*035 $a(NO-LaBS)14273952(bibid)
*035 $a(NO-TrBIB)070193231
*035 $a070193231-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.6.056
*1112 $aSKLOIS Conference on Information Security and Cryptology$0(NO-TrBIB)6054725$_34884800
*24510$aInformation security and cryptology :$bsecond SKLOIS conference, Inscrypt 2006, Beijing, China, November 29-December 1, 2006 : proceedings$cHelger Lipmaa, Moti Yung, Dongdai Lin (eds.)
*260 $aBerlin$bSpringer$cc2006
*300 $aXI, 303 s.$bill.
*4901 $aLecture notes in computer science$v4318
*650 7$aDatasikkerhet$2tekord$9nob$vKongresser$_187404500
*650 7$aKryptografi$2tekord$9nno$_189103200
*7001 $aLin, Dongdai$0(NO-TrBIB)6054723$_34884900
*7001 $aLipmaa, Helger$0(NO-TrBIB)7010764$_34885000
*7001 $aYung, Moti$0(NO-TrBIB)3040318$_34885100
*7102 $aState Key Laboratory of Information Security$0(NO-TrBIB)6054722$_34885200
*7760 $tInformation Security and Cryptology (vol. # 4318) : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings$w990704815554702201
*830 0$aLecture notes in computer science$v4318$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/?isbn=9783540496083
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=9783540496083
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/?isbn=9783540496083
*85642$3Miniatyrbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/3/8/9783540496083.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/3/8/9783540496083.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990701932314702202$b2021-11-14T19:50:59Z$z990701932314702202
^