LEADER 02524nlm0 22006851i 450 001 990009261100403321 010 $a9783642027048 035 $a000926110 035 $aFED01000926110 035 $a(Aleph)000926110FED01 035 $a000926110 100 $a20100926d2009----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aAutonomic and Trusted Computing$bRisorsa elettronica$e6th International Conference, ATC 2009 Brisbane, Australia, July 7-9, 2009 Proceedings$fedited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, Juan González Nieto, Wolfgang Reif, Guojun Wang, Jadwiga Indulska 210 $aBerlin ; Heidelberg$cSpringer$d2009 225 1 $aLecture Notes in Computer Science$x0302-9743$v5586 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aGonzález Nieto,$bJuan 702 1$aHutchison,$bDavid 702 1$aIndulska,$bJadwiga 702 1$aKanade,$bTakeo 702 1$aKittler,$bJosef 702 1$aKleinberg,$bJon M. 702 1$aMattern,$bFriedemann 702 1$aMitchell,$bJohn C. 702 1$aNaor,$bMoni 702 1$aNierstrasz,$bOscar 702 1$aPandu Rangan,$bC. 702 1$aReif,$bWolfgang 702 1$aSteffen,$bBernhard 702 1$aSudan,$bMadhu 702 1$aTerzopoulos,$bDemetri 702 1$aTygar,$bDoug 702 1$aVardi,$bMoshe Y. 702 1$aWang,$bGuojun 702 1$aWeikum,$bGerhard 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-642-02704-8 901 $aEB 912 $a990009261100403321 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aInformation Systems 961 $aInformation systems 961 $aInformation Systems Applications (incl.Internet) 961 $aManagement of Computing and Information Systems 961 $aSoftware engineering 961 $aSoftware Engineering 961 $aSystems and Data Security 996 $aAutonomic and Trusted Computing$9773129 997 $aUNINA