*001178962
*00520250613104345.0
*007ta
*008110826s2005 gw 100 u eng d
*00901959cam a2200373 c 4500
*019 $bl
*020 $a3540308490$qh.
*020 $a9783540308492$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990611029204702201
*035 $a(NO-LaBS)15131039(bibid)
*035 $a(NO-TrBIB)06110292x
*035 $a06110292x-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a003.26
*1112 $aCANS 2005$0(NO-TrBIB)6053818$_41322300
*24510$aCryptology and network security :$b4th international conference, CANS 2005, Xiamen, China, December 14-16, 2005 : proceedings$cYvo G. Desmedt ... [et al.] (eds.)
*260 $aBerlin$bSpringer$cc2005
*300 $aXI, 348 s.$bill.
*4901 $aLecture notes in computer science$v3810
*650 7$aDatamaskinnett$xSikkerhet$2tekord$_189039900
*650 7$aKryptografi$2tekord$9nno$vKongresser$_189103200
*7001 $aDesmedt, Yvo G.$0(NO-TrBIB)90779105$_41322400
*7760 $tCryptology and Network Security (vol. # 3810) : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings$w990704771594702201
*830 0$aLecture notes in computer science$v3810$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/?isbn=3540308490
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/?isbn=9783540308492
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540308490
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540308492
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540308492
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/2/9/9783540308492.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/0/9/3540308490.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/2/9/9783540308492.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990611029204702202$b2021-11-14T19:54:33Z$z990611029204702202
^