LEADER 00751nam0-22002651i-450- 001 990006974410403321 035 $a000697441 035 $aFED01000697441 035 $a(Aleph)000697441FED01 035 $a000697441 100 $a19990530d18479999km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aLaudi$etrattati e detti$fIacopone Da Todi$ga cura di Franca Ageno 210 $aFirenze$cLe Monnier$d1847 215 $a528 p.$d18 cm 700 1$aIacopone da Todi$f<1233-1306>$0393726 702 1$aBrambilla Ageno,$bFranca$f<1913-1995> 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990006974410403321 952 $aBIB. BAT.3571$b7711$fBAT 959 $aBAT 996 $aLaudi$9700363 997 $aUNINA LEADER 01764nlm0 22004931i 450 001 990009253460403321 010 $a9783540689140 035 $a000925346 035 $aFED01000925346 035 $a(Aleph)000925346FED01 035 $a000925346 100 $a20100926d2008----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aApplied Cryptography and Network Security$bRisorsa elettronica$e6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings$fedited by Steven M. Bellovin, Rosario Gennaro, Angelos Keromytis, Moti Yung 210 $aBerlin ; Heidelberg$cSpringer$d2008 225 1 $aLecture Notes in Computer Science$x0302-9743$v5037 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aBellovin,$bSteven M. 702 1$aGennaro,$bRosario 702 1$aKeromytis,$bAngelos 702 1$aYung,$bMoti 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-540-68914-0 901 $aEB 912 $a990009253460403321 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aInformation systems 961 $aInformation Systems 961 $aInformation Systems Applications (incl.Internet) 961 $aManagement of Computing and Information Systems 961 $aSystems and Data Security 996 $aApplied Cryptography and Network Security$9771881 997 $aUNINA