000801512 000__ 01464cam\a2200397Ii\4500 000801512 001__ 801512 000801512 005__ 20230306143638.0 000801512 006__ m\\\\\o\\d\\\\\\\\ 000801512 007__ cr\cn\nnnunnun 000801512 008__ 171102s2017\\\\sz\\\\\\ob\\\\001\0\eng\d 000801512 020__ $$a9783319681122$$q(electronic book) 000801512 020__ $$a3319681125$$q(electronic book) 000801512 020__ $$z9783319681115 000801512 035__ $$aSP(OCoLC)on1008962909 000801512 035__ $$aSP(OCoLC)1008962909 000801512 040__ $$aN$T$$beng$$erda$$epn$$cN$T$$dN$T$$dGW5XE$$dUAB 000801512 049__ $$aISEA 000801512 050_4 $$aHG1710 000801512 08204 $$a332.1/78$$223 000801512 1001_ $$aAimani, Laila el,$$eauthor. 000801512 24510 $$aVerifiable composition of signature and encryption :$$ba comprehensive study of the design paradigms /$$cLaila El Aimani. 000801512 264_1 $$aCham :$$bSpringer,$$c2017. 000801512 300__ $$a1 online resource 000801512 336__ $$atext$$btxt$$2rdacontent 000801512 337__ $$acomputer$$bc$$2rdamedia 000801512 338__ $$aonline resource$$bcr$$2rdacarrier 000801512 504__ $$aIncludes bibliographical references and index. 000801512 506__ $$aAccess limited to authorized users. 000801512 588__ $$aOnline resource; title from PDF title page (viewed November 3, 2017) 000801512 650_0 $$aElectronic funds transfers$$xSecurity measures. 000801512 650_0 $$aData encryption (Computer science) 000801512 650_0 $$aElectronic commerce$$xSecurity measures. 000801512 852__ $$bebk 000801512 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-68112-2$$zOnline Access$$91397441.1 000801512 909CO $$ooai:library.usi.edu:801512$$pGLOBAL_SET 000801512 980__ $$aEBOOK 000801512 980__ $$aBIB 000801512 982__ $$aEbook 000801512 983__ $$aOnline 000801512 994__ $$a92$$bISE