000734090 000__ 02132cam\a2200505Ii\4500 000734090 001__ 734090 000734090 005__ 20230306141120.0 000734090 006__ m\\\\\o\\d\\\\\\\\ 000734090 007__ cr\cn\nnnunnun 000734090 008__ 150929s2015\\\\sz\a\\\\o\\\\\101\0\eng\d 000734090 020__ $$a9783319241265$$qelectronic book 000734090 020__ $$a3319241265$$qelectronic book 000734090 020__ $$z9783319241258 000734090 0247_ $$a10.1007/978-3-319-24126-5$$2doi 000734090 035__ $$aSP(OCoLC)ocn922539040 000734090 035__ $$aSP(OCoLC)922539040 000734090 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dOCLCO$$dOCLCF$$dOCLCO 000734090 049__ $$aISEA 000734090 050_4 $$aQA76.9.A25 000734090 08204 $$a005.8/2$$223 000734090 1112_ $$aSPACE (Conference : Applied cryptography engineering)$$n(5th :$$d2015 :$$cJaipur, India) 000734090 24510 $$aSecurity, privacy, and applied cryptography engineering$$h[electronic resource] :$$b5th International Conference, SPACE 2015 Jaipur, India, October 3-7, 2015, Proceedings /$$cRajat Subhra Chakraborty, Peter Schwabe, Jon Solworth (eds.). 000734090 2463_ $$aSPACE 2015 000734090 264_1 $$aCham :$$bSpringer,$$c2015. 000734090 300__ $$a1 online resource (xvii, 379 pages) :$$billustrations. 000734090 336__ $$atext$$btxt$$2rdacontent 000734090 337__ $$acomputer$$bc$$2rdamedia 000734090 338__ $$aonline resource$$bcr$$2rdacarrier 000734090 4901_ $$aLecture Notes in Computer Science,$$x0302-9743 ;$$v9354 000734090 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000734090 500__ $$aInternational conference proceedings. 000734090 500__ $$aIncludes author index. 000734090 506__ $$aAccess limited to authorized users. 000734090 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 29, 2015). 000734090 650_0 $$aData encryption (Computer science)$$vCongresses. 000734090 650_0 $$aComputer security$$vCongresses. 000734090 7001_ $$aChakraborty, Rajat Subhra,$$eeditor. 000734090 7001_ $$aSchwabe, Peter,$$eeditor. 000734090 7001_ $$aSolworth, Jon,$$eeditor. 000734090 830_0 $$aLecture notes in computer science ;$$v9354. 000734090 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000734090 852__ $$bebk 000734090 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-24126-5$$zOnline Access$$91397441.1 000734090 909CO $$ooai:library.usi.edu:734090$$pGLOBAL_SET 000734090 980__ $$aEBOOK 000734090 980__ $$aBIB 000734090 982__ $$aEbook 000734090 983__ $$aOnline 000734090 994__ $$a92$$bISE