1 | <?xml version="1.0" encoding="utf-8" standalone="no"?>
|
---|
2 | <!DOCTYPE Archive SYSTEM "http://greenstone.org/dtd/Archive/1.0/Archive.dtd">
|
---|
3 | <Archive>
|
---|
4 | <Section>
|
---|
5 | <Description>
|
---|
6 | <Metadata name="gsdlsourcefilename">import/CMSwp-all.marc</Metadata>
|
---|
7 | <Metadata name="gsdldoctype">indexed_doc</Metadata>
|
---|
8 | <Metadata name="Language">en</Metadata>
|
---|
9 | <Metadata name="Encoding">utf8</Metadata>
|
---|
10 | <Metadata name="Source">CMSwp-all.marc</Metadata>
|
---|
11 | <Metadata name="SourceFile">CMSwp-all.marc</Metadata>
|
---|
12 | <Metadata name="SourceSegment">119</Metadata>
|
---|
13 | <Metadata name="Plugin">MARCPlugin</Metadata>
|
---|
14 | <Metadata name="FileFormat">MARC</Metadata>
|
---|
15 | <Metadata name="dc.Creator">Wilson, William J., computer consultant.</Metadata>
|
---|
16 | <Metadata name="dc.Title">Chinks in the armor of public key cryptosystems / by William J. Wilson.</Metadata>
|
---|
17 | <Metadata name="dc.Publisher">Hamilton, N.Z. :</Metadata>
|
---|
18 | <Metadata name="dc.Publisher">University of Waikato, Dept. of Computer Science,</Metadata>
|
---|
19 | <Metadata name="dc.Date">&#091;1994&#093;</Metadata>
|
---|
20 | <Metadata name="dc.Description">"March 1994."</Metadata>
|
---|
21 | <Metadata name="dc.Description">Includes bibliographical references (leaf 6).</Metadata>
|
---|
22 | <Metadata name="dc.Subject">Cryptography.</Metadata>
|
---|
23 | <Metadata name="dc.Subject">Computers Access control.</Metadata>
|
---|
24 | <Metadata name="dc.Creator">University of Waikato. Dept. of Computer Science.</Metadata>
|
---|
25 | <Metadata name="Identifier">HASH6a30b66a3a5419ad674b26s119</Metadata>
|
---|
26 | <Metadata name="lastmodified">1494814420</Metadata>
|
---|
27 | <Metadata name="lastmodifieddate">20170515</Metadata>
|
---|
28 | <Metadata name="oailastmodified">1494814698</Metadata>
|
---|
29 | <Metadata name="oailastmodifieddate">20170515</Metadata>
|
---|
30 | <Metadata name="assocfilepath">HASH6a30/b66a3a54/19ad674b/26s119.dir</Metadata>
|
---|
31 | </Description>
|
---|
32 | <Content><pre>
|
---|
33 | LDR 00879cam 2200229 a 4500
|
---|
34 | 001 261304
|
---|
35 | 010 _o zbn94-83767
|
---|
36 | 035 _a (nzNZBN)8409567
|
---|
37 | 008 s1994 nz b x eng d
|
---|
38 | 035 _9 ABD-9969
|
---|
39 | 092 _a QA75.5.W926 no.94/3
|
---|
40 | 100 10 _a Wilson, William J.,
|
---|
41 | _c computer consultant.
|
---|
42 | 245 10 _a Chinks in the armor of public key cryptosystems /
|
---|
43 | _c by William J. Wilson.
|
---|
44 | 260 0 _a Hamilton, N.Z. :
|
---|
45 | _b University of Waikato, Dept. of Computer Science,
|
---|
46 | _c [1994]
|
---|
47 | 300 _a 6 leaves ;
|
---|
48 | _c 30 cm.
|
---|
49 | 490 1 _a Working paper series,
|
---|
50 | _x 1170-487X ;
|
---|
51 | _v 94/3
|
---|
52 | 500 _a "March 1994."
|
---|
53 | 504 _a Includes bibliographical references (leaf 6).
|
---|
54 | 650 0 _a Cryptography.
|
---|
55 | 650 0 _a Computers
|
---|
56 | _x Access control.
|
---|
57 | 710 20 _a University of Waikato.
|
---|
58 | _b Dept. of Computer Science.
|
---|
59 | 830 0 _a Working paper series (University of Waikato. Dept. of
|
---|
60 | Computer Science) ;
|
---|
61 | _v 94/3.
|
---|
62 | </pre>
|
---|
63 | </Content>
|
---|
64 | </Section>
|
---|
65 | </Archive>
|
---|