*001846503
*00520250613104029.0
*007ta
*008150401s2001 gw 100 u eng d
*00902054cam a2200481 c 4500
*019 $bl
*020 $a3540428801$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990120909214702201
*035 $a(NO-LaBS)14478187(bibid)
*035 $a(NO-TrBIB)012090921
*035 $a012090921-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a003.26
*080 $a004.6.056
*084 $aC.2.0$2acmccs
*084 $aD.4.6$2acmccs
*084 $aE.3.0$2acmccs
*084 $aF.2.1$2acmccs
*084 $aG.2.1$2acmccs
*084 $aJ.1.0$2acmccs
*084 $aK.6.5$2acmccs
*1112 $aICICS 2001$0(NO-TrBIB)1098588$_110851500
*24510$aInformation and communications security :$bthird international conference, ICICS 2001, Xian, China, November 13-16, 2001 : proceedings$cSihan Qing, Tatsuaki Okamoto, Jianying Zhou (eds.)
*260 $aBerlin$bSpringer$cc2001
*300 $aXIV, 504 s.$bill.
*4901 $aLecture notes in computer science$v2229
*650 7$aDatasikkerhet$0(NO-TrBIB)REAL005212$2noubomn$_185599800
*650 7$aDatasikkerhet$2tekord$9nob$vKongresser$_187404500
*650 7$aKryptografi$0(NO-TrBIB)REAL007626$2noubomn$_193070900
*650 7$aKryptografi$2tekord$9nno$_189103200
*7001 $aOkamoto, Tatsuaki$d1952-$0(NO-TrBIB)97050235$_50618900
*7001 $aQing, Sihan$0(NO-TrBIB)97050234$_30827900
*7001 $aZhou, Jianying$0(NO-TrBIB)1098586$_34127300
*7760 $tICICS 2001$w990219701304702201
*830 0$aLecture notes in computer science$v2229$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/?isbn=3540428801
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540428800
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540428801
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540428800
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540428800
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/0/0/9783540428800.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990120909214702202$b2021-11-14T20:53:52Z$z990120909214702202
^