LEADER 01585nam 2200421Ka 450 001 9910695299103321 005 20060725090018.0 035 $a(CKB)5470000002367745 035 $a(OCoLC)70687662 035 $a(EXLCZ)995470000002367745 100 $a20060725d2006 ua 0 101 0 $aeng 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCryptographic algorithms and key sizes for Personal Identity Verification$b[electronic resource] /$fW. Timothy Polk, Donna F. Dodson, William E. Burr 205 $aDraft. 210 1$aGaithersburg, MD :$cU.S. Dept. of Commerce, National Institute of Standards and Technology,$d[2006] 215 $av, 17 pages $cdigital, PDF file 225 1 $aNIST special publication ;$v800-78-1.$aInformation security 300 $aTitle from title screen (viewed on July 24, 2006). 300 $a"June 2006." 606 $aData encryption (Computer science) 606 $aBiometric identification 606 $aComputer security$xStandards$zUnited States 615 0$aData encryption (Computer science) 615 0$aBiometric identification. 615 0$aComputer security$xStandards 700 $aPolk$b William T$01383744 701 $aDodson$b Donna F$01383745 701 $aBurr$b William E$01383746 712 02$aNational Institute of Standards and Technology (U.S.) 801 0$bGPO 801 1$bGPO 906 $aBOOK 912 $a9910695299103321 996 $aCryptographic algorithms and key sizes for personal identity verification$93429041 997 $aUNINA