01389nam a2200337 a 4500001001200000003000800012006001900020007001500039008004100054010001700095020002600112020002700138040002100165035002100186050002700207082001600234100002700250245010400277260004800381300002500429490007300454504005100527533015200578650002900730650003100759655002900790710001700819830007200836856012600908999001701034ebr10645213CaPaEBRm u cr cn|||||||||120820s2013 njuad sb 001 0 eng d z 2012025411 z9781118317129 (cloth) z9781118482315 (e-book) aCaPaEBRcCaPaEBR a(OCoLC)82873598914aTK5102.94b.B38 2013eb04a005.8/22231 aBatten, Lynn Margaret.10aPublic key cryptographyh[electronic resource] :bapplications and attacks /cLynn Margaret Batten. aHoboken, N.J. :bJohn Wiley & Sons,cc2013. axvii, 201 p. :bill.1 aIEEE Press series on information and communication networks security aIncludes bibliographical references and index. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2013.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aPublic key cryptography. 0aCryptographyxMathematics. 7aElectronic books.2local2 aebrary, Inc. 0aIEEE Press series on information & communication networks security.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10645213zAn electronic book accessible through the World Wide Web; click to view c42417d42417