000 | 02736cam a2200421 a 4500 | ||
---|---|---|---|
001 | 461635 | ||
003 | RPAM | ||
005 | 20160624102303.0 | ||
006 | aa b 000 0 | ||
007 | cr/||||||||||| | ||
008 | 140928s1983 riua ob 000 0 eng | ||
020 | _a9780821892442 (online) | ||
040 |
_aDLC _cDLC _dDLC _dRPAM |
||
050 | 0 | 0 |
_aQA76.9.A25 _bA66 1983 |
082 | 0 | 0 |
_a001.64 _219 |
245 | 0 | 0 |
_aApplied cryptology, cryptographic protocols, and computer security models. _h[electronic resource] |
260 |
_aProvidence, R.I. : _bAmerican Mathematical Society, _cc1983. |
||
300 | _a1 online resource (xi, 192 p. : ill.) | ||
490 | 1 |
_aProceedings of symposia in applied mathematics, _x0160-7634 (print); _x2324-7088 (online); _vv. 29 |
|
500 | _aExpanded version of notes prepared for the AMS short course entitled Cryptology in revolution, mathematics and models, held in San Francisco, Calif., Jan. 5-6, 1981, by Richard A. DeMillo and others. | ||
504 | _aBibliography: p. 187-192. | ||
505 | 0 | 0 |
_tIntroduction / _rRichard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- _uhttp://www.ams.org/psapm/029 _uhttp://dx.doi.org/10.1090/psapm/029/9880 _tCryptography / _rRichard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- _uhttp://www.ams.org/psapm/029 _uhttp://dx.doi.org/10.1090/psapm/029/9879 _tComputer System Security Models / _rRichard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- _uhttp://www.ams.org/psapm/029 _uhttp://dx.doi.org/10.1090/psapm/029/9878 _tProtocols and Security / _rRichard A. DeMillo, George I. Davida, David P. Dobkin, Michael A. Harrison and Richard J. Lipton -- _uhttp://www.ams.org/psapm/029 _uhttp://dx.doi.org/10.1090/psapm/029/9877 |
506 | 1 | _aAccess is restricted to licensed institutions | |
533 |
_aElectronic reproduction. _bProvidence, Rhode Island : _cAmerican Mathematical Society. _d2012 |
||
538 | _aMode of access : World Wide Web | ||
588 | _aDescription based on print version record. | ||
650 | 0 |
_aComputers _xAccess control. |
|
650 | 0 | _aCryptography. | |
700 | 1 | _aDeMillo, Richard A. | |
710 | 2 | _aAmerican Mathematical Society. | |
776 | 0 |
_iPrint version: _tApplied cryptology, cryptographic protocols, and computer security models. _w(DLC) 83015548 _x0160-7634 _z9780821800416 |
|
786 | _dAmerican Mathematical Society | ||
830 | 0 |
_aProceedings of symposia in applied mathematics ; _vv. 29. |
|
830 | 0 |
_aProceedings of symposia in applied mathematics. _pAMS short course lecture notes. |
|
856 | 4 |
_3Contents _uhttp://www.ams.org/psapm/029 |
|
856 | 4 |
_3Contents _uhttp://dx.doi.org/10.1090/psapm/029 |
|
942 |
_2EBK12296 _cEBK |
||
999 |
_c41590 _d41590 |