LEADER 01519nlm0 22004571i 450 001 990009253500403321 010 $a9783540690191 035 $a000925350 035 $aFED01000925350 035 $a(Aleph)000925350FED01 035 $a000925350 100 $a20100926d2008----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aTransactions on Data Hiding and Multimedia Security III$bRisorsa elettronica$fedited by Yun Q. Shi 210 $aBerlin ; Heidelberg$cSpringer$d2008 225 1 $aLecture Notes in Computer Science$x1861-3043$v4920 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aShi,$bYun Q. 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-540-69019-1 901 $aEB 912 $a990009253500403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aInformation Systems 961 $aManagement of Computing and Information Systems 961 $aMultimedia Information Systems 961 $aMultimedia systems 961 $aSystems and Data Security 996 $aTransactions on Data Hiding and Multimedia Security III$9774337 997 $aUNINA