LEADER 01013nam0-22003491i-450- 001 990002508110403321 005 20050406155235.0 035 $a000250811 035 $aFED01000250811 035 $a(Aleph)000250811FED01 035 $a000250811 100 $a20030910d1987----km-y0itay50------ba 101 0 $aita 102 $aIT 200 1 $a<>informatica nella pubblica amministrazione$eproblemi, risultati, prospettive 210 $aRoma$cNIS$d1987 215 $a346 p.$d21 cm 225 1 $a<>pubblica amministrazione$v2 610 0 $aInformatica, Informatica di base 676 $a351.007$v12 rid.$zita 700 1$aD'Elia Ciampi,$bIsabella$0416547 702 1$aCiampi,$bCostantino 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990002508110403321 952 $aVII-A-8$b343$fMAS 952 $aVI I 540$bs.i.$fDDA 952 $aVI I 617$bs.i.$fDDA 959 $aDDA 959 $aMAS 996 $aInformatica nella Pubblica Amministrazione$9324773 997 $aUNINA LEADER 01637nlm0 22004691i 450 001 990009236900403321 010 $a9783540318408 035 $a000923690 035 $aFED01000923690 035 $a(Aleph)000923690FED01 035 $a000923690 100 $a20100926d2005----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aAdvanced Encryption Standard – AES$bRisorsa elettronica$e4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers$fedited by Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa 210 $aBerlin ; Heidelberg$cSpringer$d2005 225 1 $aLecture Notes in Computer Science$x0302-9743$v3373 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aDobbertin,$bHans 702 1$aRijmen,$bVincent 702 1$aSowa,$bAleksandra 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/b137765 901 $aEB 912 $a990009236900403321 961 $aAlgebra$aData processing 961 $aAlgorithm Analysis and Problem Complexity 961 $aAlgorithms 961 $aAlgorithms 961 $aComputational complexity 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aDiscrete Mathematics in Computer Science 961 $aSymbolic and Algebraic Manipulation 996 $aAdvanced Encryption Standard – AES$9772743 997 $aUNINA