LEADER 02472nlm0 22006731i 450 001 990009255850403321 010 $a9783540794998 035 $a000925585 035 $aFED01000925585 035 $a(Aleph)000925585FED01 035 $a000925585 100 $a20100926d2008----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aInformation Security and Cryptology$bRisorsa elettronica$eThird SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers$fedited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Dingyi Pei, Moti Yung, Dongdai Lin, Chuankun Wu 210 $aBerlin ; Heidelberg$cSpringer$d2008 225 1 $aLecture Notes in Computer Science$x0302-9743$v4990 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aHutchison,$bDavid 702 1$aKanade,$bTakeo 702 1$aKittler,$bJosef 702 1$aKleinberg,$bJon M. 702 1$aLin,$bDongdai 702 1$aMattern,$bFriedemann 702 1$aMitchell,$bJohn C. 702 1$aNaor,$bMoni 702 1$aNierstrasz,$bOscar 702 1$aPandu Rangan,$bC. 702 1$aPei,$bDingyi 702 1$aSteffen,$bBernhard 702 1$aSudan,$bMadhu 702 1$aTerzopoulos,$bDemetri 702 1$aTygar,$bDoug 702 1$aVardi,$bMoshe Y. 702 1$aWeikum,$bGerhard 702 1$aWu,$bChuankun 702 1$aYung,$bMoti 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-540-79499-8 901 $aEB 912 $a990009255850403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aInformation Systems 961 $aManagement of Computing and Information Systems 961 $aSystems and Data Security 996 $aInformation Security and Cryptology$9772230 997 $aUNINA