Protocols for authentication and key establishment
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Unknown |
Published: |
Berlin New York
Springer
2003.
|
Series: | Information security and cryptography
|
Subjects: | |
Online Access: | Click Here to View Status and Holdings. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000n a2200000 a 4501 | ||
---|---|---|---|
001 | wils-308059 | ||
020 | # | # | |a 3540431071 (alk. paper) |
090 | 0 | 0 | |a TK5105.59 |b .B59 2003 |
100 | 1 | # | |a Boyd, Colin. |
245 | 1 | 0 | |a Protocols for authentication and key establishment |c Colin Boyd, Anish Mathuria. |
260 | # | # | |a Berlin |a New York |b Springer |c 2003. |
300 | # | # | |a xxiv, 321 p. |c 24 cm. |
490 | 1 | # | |a Information security and cryptography |
504 | # | # | |a Includes bibliographical references (p. [295]-316) and indexes. |
650 | # | 0 | |a Computer network protocols |
650 | # | 0 | |a Computer networks |x Security measures |
650 | # | 0 | |a Data encryption (Computer science) |
650 | # | 0 | |a Public key infrastructure (Computer security) |
700 | 1 | # | |a Mathuria, Anish |c 1967- |
856 | 4 | 0 | |z Click Here to View Status and Holdings. |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=308059 |
964 | # | # | |c BOK |d 01 |
040 | # | # | |a Shah Alam |
998 | # | # | |a 00260##a002.8.2||00260##a002.8.2||00260##b002.8.4||00260##c002.7.6||00300##a003.4.1||00300##c003.5.1|| |