Property | Value |
dcterms:bibliographicCitation
|
<http://dblp.uni-trier.de/rec/bibtex/conf/isw/2000>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Eiji_Okamoto>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Jennifer_Seberry>
|
dc:creator
|
<https://dblp.l3s.de/d2r/resource/authors/Josef_Pieprzyk>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Eiji_Okamoto>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Jennifer_Seberry>
|
swrc:editor
|
<https://dblp.l3s.de/d2r/resource/authors/Josef_Pieprzyk>
|
foaf:homepage
|
<http://dx.doi.org/doi.org%2F10.1007%2F3-540-44456-4>
|
foaf:homepage
|
<https://doi.org/10.1007/3-540-44456-4>
|
dc:identifier
|
DBLP conf/isw/2000
(xsd:string)
|
dc:identifier
|
DOI doi.org%2F10.1007%2F3-540-44456-4
(xsd:string)
|
dc:identifier
|
ISBN 3-540-41416-9
(xsd:string)
|
swrc:isbn
|
ISBN 3-540-41416-9
(xsd:string)
|
dcterms:issued
|
2000
(xsd:gYear)
|
rdfs:label
|
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings
(xsd:string)
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/Benedens00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/BoydK00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/BrisbaneSO00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/Ferrer-GomilaPR00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/GotoMMS00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/HachezHJQV00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/KuribayashiT00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/LinWK00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/Lindkvist00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/MaitlandRFBD00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/MorganNHL00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/NakanishiS00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/NojiriHI00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/OmoteM00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/ParkBD00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/Payne00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/RosenbaumS00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/Safavi-NainiS00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/SebeDH00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/SelcukS00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/SeppanenMK00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/SteinfeldZ00>
|
is
dcterms:partOf
of
|
<https://dblp.l3s.de/d2r/resource/publications/conf/isw/YenZ00>
|
dc:publisher
|
Springer
(xsd:string)
|
owl:sameAs
|
<http://bibsonomy.org/uri/bibtexkey/conf/isw/2000/dblp>
|
owl:sameAs
|
<http://dblp.rkbexplorer.com/id/conf/isw/2000>
|
owl:sameAs
|
<urn:isbn:3-540-41416-9>
|
rdfs:seeAlso
|
<http://amazon.com/s/ref=nb_ss_gw?field-keywords=3-540-41416-9>
|
rdfs:seeAlso
|
<https://doi.org/10.1007/3-540-44456-4>
|
swrc:series
|
<https://dblp.l3s.de/d2r/resource/conferences/isw>
|
dcterms:tableOfContent
|
<http://dblp.uni-trier.de/db/conf/isw/isw2000.html>
|
dc:title
|
Information Security, Third International Workshop, ISW 2000, Wollongong, NSW, Australia, December 20-21, 2000, Proceedings
(xsd:string)
|
dc:type
|
<http://purl.org/dc/dcmitype/Collection>
|
rdf:type
|
swrc:Proceedings
|
rdf:type
|
foaf:Document
|
swrc:volume
|
1975
(xsd:string)
|