LEADER 02221nlm0 22006131i 450 001 990009259740403321 010 $a9783642008436 035 $a000925974 035 $aFED01000925974 035 $a(Aleph)000925974FED01 035 $a000925974 100 $a20100926d2009----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aInformation Security Practice and Experience$bRisorsa elettronica$e5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings$fedited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Feng Bao, Hui Li, Guilin Wang 210 $aBerlin ; Heidelberg$cSpringer$d2009 225 1 $aLecture Notes in Computer Science$x0302-9743$v5451 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aBao,$bFeng 702 1$aHutchison,$bDavid 702 1$aKanade,$bTakeo 702 1$aKittler,$bJosef 702 1$aKleinberg,$bJon M. 702 1$aLi,$bHui 702 1$aMattern,$bFriedemann 702 1$aMitchell,$bJohn C. 702 1$aNaor,$bMoni 702 1$aNierstrasz,$bOscar 702 1$aPandu Rangan,$bC. 702 1$aSteffen,$bBernhard 702 1$aSudan,$bMadhu 702 1$aTerzopoulos,$bDemetri 702 1$aTygar,$bDoug 702 1$aVardi,$bMoshe Y. 702 1$aWang,$bGuilin 702 1$aWeikum,$bGerhard 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-642-00843-6 901 $aEB 912 $a990009259740403321 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aComputers and Society 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aSystems and Data Security 996 $aInformation Security Practice and Experience$9772300 997 $aUNINA