000 01594nmm a22004335u 4500
003 OSt
007 cr nn 008mamaa
008 070919s2006 xx s j eng d
020 _a9783540327325
040 _aUCA
_cUCA
100 1 _aHalevi, Shai.
245 1 4 _aTheory of Cryptography (vol. # 3876)
_h[Recurso electrónico] /
_bThird Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings
_cedited by Shai Halevi, Tal Rabin.
260 _aBerlin Heidelberg :
_bSpringer-Verlag GmbH.,
_c2006
300 _bv.: digital
490 0 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v3876
506 _aRestringido a usuarios de la UCA
538 _aModo de acceso: World Wide Web
650 0 0 _aComputational complexity
650 0 0 _aComputer science
650 0 0 _aComputer software
650 0 0 _aData encryption (Computer science)
650 0 0 _aInformation Systems
650 0 0 _aOperating systems (Computers)
650 0 0 _aComputer Science
650 0 0 _aAlgorithm Analysis and Problem Complexity
650 0 0 _aComputers and Society
650 0 0 _aData Encryption
650 0 0 _aDiscrete Mathematics in Computer Science
650 0 0 _aManagement of Computing and Information Systems
650 0 0 _aOperating Systems
700 1 _aRabin, Tal
710 2 _aSpringerLink (Online service)
740 0 _aSpringerLink e-books (Servicio en línea)
773 0 _tSpringer e-books
856 4 0 _uhttp://dx.doi.org/10.1007/11681878
_zTexto completo
909 _binter
_c-
942 _n0
998 _b0
_c080424
_de
_ey
_f-
_g4
999 _c837983
_d837983