*001630264
*00520250613104152.0
*007ta
*008110902s2005 gw 100 u eng d
*00901873cam a2200385 c 4500
*019 $bl
*020 $a3540262237$qh.
*020 $a9783540262237$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990601462494702201
*035 $a(NO-LaBS)14310164(bibid)
*035 $a(NO-TrBIB)060146249
*035 $a060146249-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.7.056
*1112 $aACNS 2005$0(NO-TrBIB)6007661$_92083300
*24510$aApplied cryptography and network security :$bthird international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings$cJohn Ioannidis, Angelos Keromytis, Moti Yung (eds.)
*260 $aBerlin$bSpringer$cc2005
*300 $aXI, 530 s.$bill.
*4901 $aLecture notes in computer science$v3531
*650 7$aDatamaskinnett$xSikkerhet$2tekord$vKongresser$_189039900
*650 7$aKryptografi$2tekord$9nno$_189103200
*7001 $aIoannidis, John$0(NO-TrBIB)6007660$_92083400
*7001 $aKeromytis, Angelos$0(NO-TrBIB)6007659$_92083500
*7001 $aYung, Moti$0(NO-TrBIB)3040318$_34885100
*7760 $tACNS 2005$w990602091194702201
*830 0$aLecture notes in computer science$v3531$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540262237
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540262237
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540262237
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540262237
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/7/3/9783540262237.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/7/3/3540262237.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/7/3/9783540262237.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990601462494702202$b2021-11-14T20:37:15Z$z990601462494702202
^