LEADER 02405nlm0 22006731i 450 001 990009257950403321 010 $a9783540887331 035 $a000925795 035 $aFED01000925795 035 $a(Aleph)000925795FED01 035 $a000925795 100 $a20100926d2008----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aProvable Security$bRisorsa elettronica$eSecond International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings$fedited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Joonsang Baek, Feng Bao, Kefei Chen, Xuejia Lai 210 $aBerlin ; Heidelberg$cSpringer$d2008 225 1 $aLecture Notes in Computer Science$x0302-9743$v5324 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aBaek,$bJoonsang 702 1$aBao,$bFeng 702 1$aChen,$bKefei 702 1$aHutchison,$bDavid 702 1$aKanade,$bTakeo 702 1$aKittler,$bJosef 702 1$aKleinberg,$bJon M. 702 1$aLai,$bXuejia 702 1$aMattern,$bFriedemann 702 1$aMitchell,$bJohn C. 702 1$aNaor,$bMoni 702 1$aNierstrasz,$bOscar 702 1$aPandu Rangan,$bC. 702 1$aSteffen,$bBernhard 702 1$aSudan,$bMadhu 702 1$aTerzopoulos,$bDemetri 702 1$aTygar,$bDoug 702 1$aVardi,$bMoshe Y. 702 1$aWeikum,$bGerhard 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-540-88733-1 901 $aEB 912 $a990009257950403321 961 $aAlgebra$aData processing 961 $aCoding and Information Theory 961 $aCoding theory 961 $aComputer science 961 $aComputer Science 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aInformation theory 961 $aMathematical Logic and Formal Languages 961 $aSymbolic and Algebraic Manipulation 961 $aSystems and Data Security 961 $aTheory of Computation 996 $aProvable Security$9772128 997 $aUNINA