LEADER 01293nmm a2200349 u 4500
001 EB000287789
003 EBX01000000000000000053473
005 00000000000000.0
007 cr|||||||||||||||||||||
008 101003 |||
020 |a 9783540624943 
020 |a 978-3-540-62494-3 
100 1 |a Lomas, Mark 
245 0 0 |a Security Protocols  |h Elektronische Ressource  |b International Workshop Cambridge, United Kingdom April 10-12, 1996 Proceedings  |c by Mark Lomas 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 1997 
300 |b v. digital 
989 |b LNCS  |a Lecture Notes in Computer Science 
490 0 |a Lecture Notes in Computer Science 
856 4 0 |u http://dx.doi.org/10.1007/3-540-62494-5?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004 
650 4 |a Computer Communication Networks 
650 4 |a Computer science 
650 4 |a Computer science_xMathematics 
650 4 |a Computer software 
650 4 |a Data encryption (Computer science) 
650 4 |a Telecommunication 
650 4 |a Computer Science 
650 4 |a Algorithm Analysis and Problem Complexity 
650 4 |a Communications Engineering, Networks 
650 4 |a Computational Mathematics and Numerical Analysis 
650 4 |a Computer Communication Networks 
650 4 |a Data Encryption