<?xml version="1.0" encoding="UTF-8"?>
<record
    xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd"
    xmlns="http://www.loc.gov/MARC21/slim">

  <leader>00972    a2200229   4500</leader>
  <controlfield tag="003">Nust</controlfield>
  <controlfield tag="005">20221020105902.0</controlfield>
  <datafield tag="010" ind1=" " ind2=" ">
    <subfield code="a">  2003060643</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
    <subfield code="a">354020105X (alk. paper)</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
    <subfield code="c">Nust</subfield>
  </datafield>
  <datafield tag="082" ind1="0" ind2="0">
    <subfield code="a">005.82,LIN</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2=" ">
    <subfield code="a">Lindell, Yehuda.</subfield>
    <subfield code="9">100940</subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
    <subfield code="a">Composition of secure multi-party protocols :</subfield>
    <subfield code="b">a comprehensive study / </subfield>
    <subfield code="c">Yehuda Lindell.</subfield>
  </datafield>
  <datafield tag="260" ind1=" " ind2=" ">
    <subfield code="a">Berlin ;</subfield>
    <subfield code="a">New York :</subfield>
    <subfield code="b">Springer,</subfield>
    <subfield code="c">2003.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
    <subfield code="a">xvi, 192 p. :</subfield>
    <subfield code="b">ill. ;</subfield>
    <subfield code="c">24 cm.</subfield>
  </datafield>
  <datafield tag="440" ind1=" " ind2="0">
    <subfield code="a">Lecture notes in computer science ;</subfield>
    <subfield code="v">2815</subfield>
    <subfield code="9">26093</subfield>
  </datafield>
  <datafield tag="505" ind1=" " ind2=" ">
    <subfield code="a">Introduction (Page-1), The Composition Of Authenticated Byzantine Agreement (Page-21), Secure Computation Without Agreement (Page-45), Universally Compostable Multi-Party Computations (Page-81).</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computer security.</subfield>
    <subfield code="9">570</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
    <subfield code="a">Computers</subfield>
    <subfield code="x">Access control.</subfield>
    <subfield code="9">6085</subfield>
  </datafield>
  <datafield tag="856" ind1="4" ind2="2">
    <subfield code="3">Publisher description</subfield>
    <subfield code="u">http://www.loc.gov/catdir/enhancements/fy0818/2003060643-d.html</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
    <subfield code="c">REF</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="k">005.82,LIN</subfield>
  </datafield>
  <datafield tag="999" ind1=" " ind2=" ">
    <subfield code="c">175327</subfield>
    <subfield code="d">175327</subfield>
  </datafield>
  <datafield tag="952" ind1=" " ind2=" ">
    <subfield code="0">0</subfield>
    <subfield code="1">0</subfield>
    <subfield code="2">ddc</subfield>
    <subfield code="4">0</subfield>
    <subfield code="7">0</subfield>
    <subfield code="a">MCS</subfield>
    <subfield code="b">MCS</subfield>
    <subfield code="c">GEN</subfield>
    <subfield code="d">2016-12-12</subfield>
    <subfield code="o">005.82,LIN</subfield>
    <subfield code="p">MCS32748</subfield>
    <subfield code="r">2016-12-08</subfield>
    <subfield code="w">2016-12-12</subfield>
    <subfield code="y">BK</subfield>
    <subfield code="z">Almirah No.9, Shelf No.5</subfield>
  </datafield>
</record>
