*001133477
*00520250613104409.0
*007ta
*008110830s2006 gw 100 u eng d
*00901709cam a2200361 c 4500
*019 $bl
*020 $a3540333541$qh.
*020 $a9783540333548$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990615941564702201
*035 $a(NO-LaBS)14177442(bibid)
*035 $a(NO-TrBIB)061594156
*035 $a061594156-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a003.26
*080 $a004.6.056
*1112 $aICISC 2005$0(NO-TrBIB)6075097$_35162100
*24510$aInformation security and cryptology - ICISC 2005 :$b8th international conference, Seoul, Korea, December 1-2, 2005 : revised selected papers$cDongho Won, Seungjoo Kim (eds.)
*260 $aBerlin$bSpringer$cc2006
*300 $aXIV, 458 s.$bill.
*4901 $aLecture notes in computer science$v3935
*650 7$aDatasikkerhet$2tekord$9nob$vKongresser$_187404500
*650 7$aKryptografi$2tekord$9nno$_189103200
*7001 $aKim, Seungjoo$0(NO-TrBIB)6075096$_35162200
*7001 $aWon, Dongho$0(NO-TrBIB)1073390$_35162300
*7760 $tInformation Security and Cryptology - ICISC 2005 : 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers$w990704783174702201
*830 0$aLecture notes in computer science$v3935$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/?isbn=9783540333548
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=9783540333548
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/?isbn=9783540333548
*85642$3Miniatyrbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/8/4/9783540333548.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/8/4/9783540333548.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990615941564702202$b2021-11-14T19:51:08Z$z990615941564702202
^