LEADER 00738nam0-22002771i-450- 001 990000349220403321 005 20001010 035 $a000034922 035 $aFED01000034922 035 $a(Aleph)000034922FED01 035 $a000034922 100 $a20001010d--------km-y0itay50------ba 101 0 $aita 105 $ay-------001yy 200 1 $aThermodynamics of crystals$fD.C. Wallace. 210 $aNew York$cWiley & Sons$dcopyr. 1972 215 $a... pp. ... cm 700 1$aWallace,$bDuane C.$051157 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990000349220403321 952 $a04 127-68$bCA 700$fDINCH 959 $aDINCH 996 $aThermodynamics of crystals$9125080 997 $aUNINA DB $aING01 LEADER 01654nlm0 22004691i 450 001 990009262560403321 010 $a9783642044441 035 $a000926256 035 $aFED01000926256 035 $a(Aleph)000926256FED01 035 $a000926256 100 $a20100926d2009----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aComputer Security – ESORICS 2009$bRisorsa elettronica$e14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings$fedited by Michael Backes, Peng Ning 210 $aBerlin ; Heidelberg$cSpringer$d2009 225 1 $aLecture Notes in Computer Science$x0302-9743$v5789 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aBackes,$bMichael 702 1$aNing,$bPeng 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-642-04444-1 901 $aEB 912 $a990009262560403321 961 $aCoding and Information Theory 961 $aCoding theory 961 $aComputational complexity 961 $aComputer science 961 $aComputer Science 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aData structures (Computer science) 961 $aData Structures, Cryptology and Information Theory 961 $aDiscrete Mathematics in Computer Science 961 $ae-Commerce/e-business 961 $aSystems and Data Security 996 $aComputer Security – ESORICS 2009$9773662 997 $aUNINA