| LDR | 02113nam a22005175i 4500 | 
|---|
| 001 | 32355 | 
|---|
| 003 | CONS | 
|---|
| 005 | 20130727071811.0 | 
|---|
| 007 | cr nn 008mamaa | 
|---|
| 008 | 121207s2012    gw |    s    |||| 0|eng d | 
|---|
| 020 |  | . | ‡a9783642354045 
			‡9978-3-642-35404-5 | 
|---|
| 024 | 7 | . | ‡a10.1007/978-3-642-35404-5 
			‡2doi | 
|---|
| 035 |  | . | ‡a(DE-He213)978-3-642-35404-5 | 
|---|
| 050 |  | 4. | ‡aQA76.9.A25 | 
|---|
| 072 |  | 7. | ‡aURY 
			‡2bicssc | 
|---|
| 072 |  | 7. | ‡aCOM053000 
			‡2bisacsh | 
|---|
| 100 | 1 | . | ‡aPieprzyk, Josef. 
			‡eeditor. | 
|---|
| 245 | 1 | 0. | ‡aCryptology and Network Security 
			‡h[electronic resource] : 
			‡b11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings / 
			‡cedited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis. | 
|---|
| 264 |  | 1. | ‡aBerlin, Heidelberg : 
			‡bSpringer Berlin Heidelberg : 
			‡bImprint: Springer, 
			‡c2012. | 
|---|
| 300 |  | . | ‡aXVI, 311 p. 48 illus. 
			‡bonline resource. | 
|---|
| 336 |  | . | ‡atext 
			‡btxt 
			‡2rdacontent | 
|---|
| 337 |  | . | ‡acomputer 
			‡bc 
			‡2rdamedia | 
|---|
| 338 |  | . | ‡aonline resource 
			‡bcr 
			‡2rdacarrier | 
|---|
| 347 |  | . | ‡atext file 
			‡bPDF 
			‡2rda | 
|---|
| 490 | 1 | . | ‡aLecture Notes in Computer Science, 
			‡x0302-9743 ; 
			‡v7712 | 
|---|
| 650 |  | 0. | ‡aComputer science. | 
|---|
| 650 |  | 0. | ‡aComputer Communication Networks. | 
|---|
| 650 |  | 0. | ‡aData protection. | 
|---|
| 650 |  | 0. | ‡aData structures (Computer science). | 
|---|
| 650 |  | 0. | ‡aData encryption (Computer science). | 
|---|
| 650 |  | 0. | ‡aCoding theory. | 
|---|
| 650 |  | 0. | ‡aComputational complexity. | 
|---|
| 650 | 1 | 4. | ‡aComputer Science. | 
|---|
| 650 | 2 | 4. | ‡aData Encryption. | 
|---|
| 650 | 2 | 4. | ‡aComputer Communication Networks. | 
|---|
| 650 | 2 | 4. | ‡aDiscrete Mathematics in Computer Science. | 
|---|
| 650 | 2 | 4. | ‡aCoding and Information Theory. | 
|---|
| 650 | 2 | 4. | ‡aData Structures, Cryptology and Information Theory. | 
|---|
| 650 | 2 | 4. | ‡aSystems and Data Security. | 
|---|
| 700 | 1 | . | ‡aSadeghi, Ahmad-Reza. 
			‡eeditor. | 
|---|
| 700 | 1 | . | ‡aManulis, Mark. 
			‡eeditor. | 
|---|
| 710 | 2 | . | ‡aSpringerLink (Online service) | 
|---|
| 773 | 0 | . | ‡tSpringer eBooks | 
|---|
| 776 | 0 | 8. | ‡iPrinted edition: 
			‡z9783642354038 | 
|---|
| 830 |  | 0. | ‡aLecture Notes in Computer Science, 
			‡x0302-9743 ; 
			‡v7712 | 
|---|
| 856 | 4 | 0. | ‡uhttp://biblioteca.ipicyt.edu.mx:2048/login?url=http://dx.doi.org/10.1007/978-3-642-35404-5 
			‡yTexto completo 
			‡9CONS | 
|---|
| 950 |  | . | ‡aComputer Science (Springer-11645) | 
|---|
| 901 |  | . | ‡a32355 
			‡b 
			‡c32355 
			‡tbiblio 
			‡sSystem Local | 
|---|