000 02643cam a2200589Ia 4500
001 ocn184982286
006 m d
007 crmn ---mucun|
008 071221s2007 gw a ob 101 0 eng d
040 _aGW5XE
_beng
_cGW5XE
_dGW5XE
_dCEF
_dGZM
_dCRU
_dCOO
_dYNG
_dNUI
_dEBLCP
_dOCLCQ
019 _a182848159
_a227334333
_a288306676
020 _a9783540756514
020 _a3540756515
020 _a9783540756507
020 _a3540756507
020 _a6611354654
020 _a9786611354657
029 1 _aNZ1
_b12056133
029 1 _aAU@
_b000042525373
029 1 _aHEBIS
_b192086499
035 _a(OCoLC)184982286
_z(OCoLC)182848159
_z(OCoLC)227334333
_z(OCoLC)288306676
050 4 _aQA76.9.A25
_bI573 2007
072 7 _aQA
_2lcco
049 _aTEXA
090 4 _aQA76.9.A25
_bI573 2007
111 2 _aInternational Workshop on Security
_n(2nd :
_d2007 :
_cNara-shi, Japan)
245 1 0 _aAdvances in information and computer security :
_bSecond International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007 : proceedings /
_cAtsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg (eds.).
246 3 0 _aSecond International Workshop on Security
246 3 0 _aInternational Workshop on Security
246 3 0 _aIWSEC 2007
260 _aBerlin ;
_aNew York :
_bSpringer,
_cc2007.
300 _a1 online resource (xiii, 460 p.) :
_bill.
490 0 _aSpringer
490 1 _aLecture notes in computer science,
_x0302-9743 ;
_v4752
490 1 _aLNCS sublibrary. SL 4, Security and cryptology
504 _aIncludes bibliographical references and index.
505 0 _aSoftware and multimedia security -- Public-key cryptography -- Network security -- E-commerce and voting -- Operating systems -- Security and information management -- Anonymity and privacy.
588 _aDescription based on print version record.
650 0 _aComputer security
_vCongresses.
650 0 _aComputers
_xAccess control
_vCongresses.
700 1 _aMiyaji, Atsuko.
700 1 _aKikuchi, Hiroaki.
700 1 _aRannenberg, Kai.
776 0 8 _iPrint version:
_aInternational Workshop on Security (2nd : 2007 : Nara-shi, Japan).
_tAdvances in information and computer security.
_dBerlin ; New York : Springer, c2007
_z9783540756507
_z3540756507
_w(OCoLC)174167970
830 0 _aLecture notes in computer science ;
_v4752.
_x0302-9743
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
856 4 0 _uhttp://ezproxy.uttyler.edu:2048/login?url=http://dx.doi.org/10.1007/978-3-540-75651-4
_yClick here to view this ebook.
901 _aSpringer
942 _cEBOOK
999 _c677283
_d681708