LEADER 01714nlm0 22004811i 450 001 990009237370403321 010 $a9783540319986 035 $a000923737 035 $aFED01000923737 035 $a(Aleph)000923737FED01 035 $a000923737 100 $a20100926d2005----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aComputer Network Security$bRisorsa elettronica$eThird International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings$fedite 210 $aBerlin ; Heidelberg$cSpringer$d2005 225 1 $aLecture Notes in Computer Science$x0302-9743$v3685 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aGorodetsky,$bVladimir 702 1$aKotenko,$bIgor 702 1$aSkormin,$bVictor 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/11560326 901 $aEB 912 $a990009237370403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aInformation Systems 961 $aManagement of Computing and Information Systems 961 $aOperating Systems 961 $aOperating systems (Computers) 996 $aComputer Network Security$9772631 997 $aUNINA