Property | Value |
dcterms:bibliographicCitation
|
<http://dblp.uni-trier.de/rec/bibtex/conf/cisc/2005>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Dengguo_Feng>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Dongdai_Lin>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Moti_Yung>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Dengguo_Feng>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Dongdai_Lin>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Moti_Yung>
|
foaf:homepage
|
<http://dx.doi.org/doi.org%2F10.1007%2F11599548>
|
foaf:homepage
|
<https://doi.org/10.1007/11599548>
|
dc:identifier
|
DBLP conf/cisc/2005
(xsd:string)
|
dc:identifier
|
DOI doi.org%2F10.1007%2F11599548
(xsd:string)
|
dc:identifier
|
ISBN 3-540-30855-5
(xsd:string)
|
swrc:isbn
|
ISBN 3-540-30855-5
(xsd:string)
|
dcterms:issued
|
2005
(xsd:gYear)
|
rdfs:label
|
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
(xsd:string)
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/0002I05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/0003K05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/BaeKPS05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/CaoL05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/ChengZQW05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/ChowCL05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/ChungMLJKA05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/Crescenzo05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/FuruyaMM05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/GaoQWZ05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/GongGHN05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/GuZ05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/KangP05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/LiGH05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/LiL05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/LiaoXQHR05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/MaZ05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/Mishra05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/MoonPKK05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/MunKKN05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/ParkKY05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/ParkSK05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/RohL05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/SchlegelV05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/ShaikhBS05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/Shao05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/TengLH05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/TsoOO05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/Vaudenay05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/WangFW05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/WeiCX05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/Wu05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/YuLP05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/Zhou05>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/cisc/ZhouCC05>
|
dc:publisher
|
Springer
(xsd:string)
|
owl:sameAs
|
<http://bibsonomy.org/uri/bibtexkey/conf/cisc/2005/dblp>
|
owl:sameAs
|
<http://dblp.rkbexplorer.com/id/conf/cisc/2005>
|
owl:sameAs
|
<urn:isbn:3-540-30855-5>
|
rdfs:seeAlso
|
<http://amazon.com/s/ref=nb_ss_gw?field-keywords=3-540-30855-5>
|
rdfs:seeAlso
|
<https://doi.org/10.1007/11599548>
|
swrc:series
|
<https://dblp.l3s.de/d2r/resource/conferences/cisc>
|
dcterms:tableOfContent
|
<http://dblp.uni-trier.de/db/conf/cisc/cisc2005.html>
|
dc:title
|
Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
(xsd:string)
|
dc:type
|
<http://purl.org/dc/dcmitype/Collection>
|
rdf:type
|
swrc:Proceedings
|
rdf:type
|
foaf:Document
|
swrc:volume
|
3822
(xsd:string)
|