It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:364283146:1625
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:364283146:1625?format=raw

LEADER: 01625nam a22004575a 4500
001 013320539-8
005 20120907191540.0
008 120704s2012 gw | s ||0| 0|eng d
020 $a9783642314483$99783642314483 (ebk.)
020 $a9783642314483
024 7 $a10.1007/978-3-642-31448-3$2doi
035 $a(Springer)9783642314483
040 $aSpringer
050 4 $aQA76.9.A25
072 7 $aUR$2bicssc
072 7 $aCOM053000$2bisacsh
082 04 $a005.8$223
100 1 $aSusilo, Willy.
245 10 $aInformation Security and Privacy :$b17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings /$cedited by Willy Susilo, Yi Mu, Jennifer Seberry.
260 $aBerlin, Heidelberg :$bSpringer Berlin Heidelberg :$bImprint: Springer,$c2012.
300 $bdigital.
490 0 $aLecture Notes in Computer Science,$x0302-9743 ;$v7372
650 10 $aComputer science.
650 0 $aData encryption (Computer science)
650 0 $aComputer science.
650 0 $aData protection.
650 0 $aCoding theory.
650 0 $aInformation systems.
650 0 $aInformation Systems.
650 24 $aSystems and Data Security.
650 24 $aData Encryption.
650 24 $aManagement of Computing and Information Systems.
650 24 $aCoding and Information Theory.
650 24 $aComputer Appl. in Administrative Data Processing.
650 24 $ae-Commerce/e-business.
700 1 $aMu, Yi.
700 1 $aSeberry, Jennifer.
776 08 $iPrinted edition:$z9783642314476
830 0 $aLecture notes in computer science ;$v7372.
988 $a20120803
906 $0VEN