| 000 | 01142nam a2200349Ia 4500 | ||
|---|---|---|---|
| 003 | OSt | ||
| 005 | 20220912144635.0 | ||
| 006 | a|||||r|||| 00| 0 | ||
| 007 | ta | ||
| 008 | 220909b |||||||| |||| 00| 0 eng d | ||
| 020 | _a9783540894094 (hb) | ||
| 020 | _aSL01535213 | ||
| 024 | _a156541 | ||
| 037 | _b550, 23/09/2011, Aviva Books Company | ||
| 037 | _cTextual | ||
| 040 |
_aCSL _beng _cCSL |
||
| 041 | _aeng | ||
| 082 | _aD65,8(B):(894), Q0 TD | ||
| 100 | _aDent Alexander, W Ed.; Zheng Yuliang Ed. | ||
| 245 | 0 | _aPractical signcrption | |
| 260 |
_aNew York _bSpringer _c2010 |
||
| 300 | _axviii;274p | ||
| 500 | _aInclude bibliographical references 257-368p; Index 269-274p | ||
| 650 | _a Application of signcryption | ||
| 650 | _a Etensions of signcryption | ||
| 650 | _a Security models Signcryption | ||
| 650 | _a Signcryption schemes | ||
| 650 | _aComputer Science | ||
| 700 | _aDent Alexander, W Ed.; Zheng Yuliang Ed. | ||
| 942 |
_hD65,8(B):(894), Q0 TD _cTEXL _2CC |
||
| 999 |
_c14405 _d14405 |
||