000801425 000__ 02114cam\a2200529Ii\4500 000801425 001__ 801425 000801425 005__ 20230306143633.0 000801425 006__ m\\\\\o\\d\\\\\\\\ 000801425 007__ cr\cn\nnnunnun 000801425 008__ 171030s2017\\\\sz\a\\\\o\\\\\101\0\eng\d 000801425 020__ $$a9783319686370$$q(electronic book) 000801425 020__ $$a3319686372$$q(electronic book) 000801425 020__ $$z9783319686363 000801425 0247_ $$a10.1007/978-3-319-68637-0$$2doi 000801425 035__ $$aSP(OCoLC)on1008567114 000801425 035__ $$aSP(OCoLC)1008567114 000801425 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dUAB 000801425 049__ $$aISEA 000801425 050_4 $$aQA76.9.A25 000801425 08204 $$a005.82$$223 000801425 1112_ $$aProvSec (Conference)$$n(11th :$$d2017 :$$cXi'an Shi, China) 000801425 24510 $$aProvable security :$$b11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings /$$cTatsuaki Okamoto, Yong Yu, Man Ho Au, Yannan Li (eds.). 000801425 2463_ $$aProvSec 2017 000801425 264_1 $$aCham, Switzerland :$$bSpringer,$$c2017. 000801425 300__ $$a1 online resource (xiii, 508 pages) :$$billustrations. 000801425 336__ $$atext$$btxt$$2rdacontent 000801425 337__ $$acomputer$$bc$$2rdamedia 000801425 338__ $$aonline resource$$bcr$$2rdacarrier 000801425 4901_ $$aLecture notes in computer science,$$x0302-9743 ;$$v10592 000801425 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000801425 500__ $$aInternational conference proceedings. 000801425 500__ $$aIncludes author index. 000801425 506__ $$aAccess limited to authorized users. 000801425 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 30, 2017). 000801425 650_0 $$aComputer security$$vCongresses. 000801425 650_0 $$aData encryption (Computer science)$$vCongresses. 000801425 650_0 $$aData protection$$vCongresses. 000801425 7001_ $$aOkamoto, Tatsuaki,$$eeditor. 000801425 7001_ $$aYu, Yong,$$eeditor. 000801425 7001_ $$aAu, Man-Ho,$$eeditor. 000801425 7001_ $$aLi, Yannan,$$eeditor. 000801425 830_0 $$aLecture notes in computer science ;$$v10592. 000801425 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000801425 852__ $$bebk 000801425 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-68637-0$$zOnline Access$$91397441.1 000801425 909CO $$ooai:library.usi.edu:801425$$pGLOBAL_SET 000801425 980__ $$aEBOOK 000801425 980__ $$aBIB 000801425 982__ $$aEbook 000801425 983__ $$aOnline 000801425 994__ $$a92$$bISE