Cryptography protocols, design and applications /
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Hauppauge, N.Y. :
Nova Science Publishers,
c2012.
|
Series: | Cryptography, steganography and data security
Privacy and identity protection |
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000nam a2200000 a 4500 | ||
---|---|---|---|
001 | 0000167767 | ||
005 | 20171002063419.0 | ||
006 | m u | ||
007 | cr cn||||||||| | ||
008 | 111004s2012 nyuad sb 001 0 eng d | ||
010 | |z 2011038358 | ||
020 | |z 9781621007791 (hardcover) | ||
020 | |z 9781621008316 (e-book) | ||
035 | |a (CaPaEBR)ebr10683052 | ||
035 | |a (OCoLC)831676496 | ||
040 | |a CaPaEBR |c CaPaEBR | ||
050 | 1 | 4 | |a QA76.9.A25 |b C846 2012eb |
082 | 0 | 4 | |a 005.8/2 |2 23 |
245 | 0 | 0 | |a Cryptography |h [electronic resource] : |b protocols, design and applications / |c Kamol Lek and Naruemol Rajapakse, editors. |
260 | |a Hauppauge, N.Y. : |b Nova Science Publishers, |c c2012. | ||
300 | |a ix, 242 p. : |b ill. (some col.). | ||
490 | 0 | |a Cryptography, steganography and data security | |
490 | 0 | |a Privacy and identity protection | |
504 | |a Includes bibliographic references and index. | ||
533 | |a Electronic reproduction. |b Palo Alto, Calif. : |c ebrary, |d 2013. |n Available via World Wide Web. |n Access may be limited to ebrary affiliated libraries. | ||
650 | 0 | |a Data encryption (Computer science) | |
650 | 0 | |a Cryptography. | |
655 | 7 | |a Electronic books. |2 local | |
700 | 1 | |a Lek, Kamol. | |
700 | 1 | |a Rajapakse, Naruemol. | |
710 | 2 | |a ebrary, Inc. | |
856 | 4 | 0 | |u http://site.ebrary.com/lib/daystar/Doc?id=10683052 |z An electronic book accessible through the World Wide Web; click to view |
908 | |a 170314 | ||
942 | 0 | 0 | |c EB |
999 | |c 156911 |d 156911 |