*001744364
*00520250613104304.0
*007ta
*008090622s2004 gw 100 u eng d
*00901760cam a2200385 c 4500
*019 $bl
*020 $a3540213767$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990410933994702201
*035 $a(NO-LaBS)14042532(bibid)
*035 $a(NO-TrBIB)041093399
*035 $a041093399-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a003.26
*080 $a004.6.056
*084 $aE.3.0$2acmccs
*1112 $aICISC 2003$0(NO-TrBIB)4080517$_102295700
*24510$aInformation security and cryptology - ICISC 2003 :$b6th international conference, Seoul, Korea, November 27-28, 2003 : revised papers$cJong In Lim, Dong Hoon Lee (eds.)
*260 $aBerlin$bSpringer$cc2004
*300 $aXII, 458 s.$bill.
*4901 $aLecture notes in computer science$v2971
*650 7$aDatasikkerhet$2tekord$9nob$vKongresser$_187404500
*650 7$aKryptografi$0(NO-TrBIB)REAL007626$2noubomn$_193070900
*650 7$aKryptografi$2tekord$9nno$_189103200
*7001 $aLee, Dong Hoon$0(NO-TrBIB)1092945$_102295800
*7001 $aLim, Jong In$0(NO-TrBIB)4080516$_102295900
*7760 $tICISC 2003$w990420362164702201
*830 0$aLecture notes in computer science$v2971$_13074400
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540213767
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540213765
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540213765
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/5/6/9783540213765.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/5/6/9783540213765.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/7/6/3540213767.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990410933994702202$b2021-11-14T20:46:16Z$z990410933994702202
^