LEADER 00929nam0-22003131i-450- 001 990000450930403321 005 20100216110709.0 035 $a000045093 035 $aFED01000045093 035 $a(Aleph)000045093FED01 035 $a000045093 100 $a20020821d1978----km-y0itay50------ba 101 0 $aeng 105 $aa-------001yy 200 1 $aFeedback and multivariable systems$fD. H. Owens 210 $aStevenage, England$cPeter Peregrinus$d©1978 215 $a318 p.$cill.$d23 cm 225 1 $aIEE control engineering series$v7 610 0 $aControllo automatico 610 0 $aSistemi di controllo retroazionati 676 $a629.831 2 700 1$aOwens,$bDavid H.$f<1948- >$0433643 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000450930403321 952 $a10 D III 328/7$b19881$fDINEL 959 $aDINEL 996 $aFeedback and multivariable systems$9334108 997 $aUNINA LEADER 01637nlm0 22004691i 450 001 990009236900403321 010 $a9783540318408 035 $a000923690 035 $aFED01000923690 035 $a(Aleph)000923690FED01 035 $a000923690 100 $a20100926d2005----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aAdvanced Encryption Standard – AES$bRisorsa elettronica$e4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers$fedited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa 210 $aBerlin ; Heidelberg$cSpringer$d2005 225 1 $aLecture Notes in Computer Science$x0302-9743$v3373 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aDobbertin,$bHans 702 1$aRijmen,$bVincent 702 1$aSowa,$bAleksandra 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/b137765 901 $aEB 912 $a990009236900403321 961 $aAlgebra$aData processing 961 $aAlgorithm Analysis and Problem Complexity 961 $aAlgorithms 961 $aAlgorithms 961 $aComputational complexity 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aDiscrete Mathematics in Computer Science 961 $aSymbolic and Algebraic Manipulation 996 $aAdvanced Encryption Standard – AES$9772743 997 $aUNINA