LEADER 01749nlm0 22004931i 450 001 990009263860403321 010 $a9783642111457 035 $a000926386 035 $aFED01000926386 035 $a(Aleph)000926386FED01 035 $a000926386 100 $a20100926d2009----km-y0itay50------ba 101 0 $aeng 102 $aDE 135 $adrnn-008mamaa 200 1 $aInformation and Communications Security$bRisorsa elettronica$e11th International Conference, ICICS 2009, Beijing, China, December 14-17, 2009. Proceedings$fedited by Sihan Qing, Chris J. Mitchell, Guilin Wang 210 $aBerlin ; Heidelberg$cSpringer$d2009 225 1 $aLecture Notes in Computer Science$x0302-9743$v5927 230 $aDocumento elettronico 336 $aTesto 337 $aFormato html, pdf 702 1$aMitchell,$bChris J. 702 1$aQing,$bSihan 702 1$aWang,$bGuilin 801 0$aIT$bUNINA$gREICAT$2UNIMARC 856 4 $zFull text per gli utenti Federico II$uhttp://dx.doi.org/10.1007/978-3-642-11145-7 901 $aEB 912 $a990009263860403321 961 $aAlgorithm Analysis and Problem Complexity 961 $aCoding and Information Theory 961 $aCoding theory 961 $aComputer Communication Networks 961 $aComputer Communication Networks 961 $aComputer science 961 $aComputer Science 961 $aComputer software 961 $aData Encryption 961 $aData encryption (Computer science) 961 $aData protection 961 $aData structures (Computer science) 961 $aData Structures, Cryptology and Information Theory 961 $aSystems and Data Security 996 $aInformation and Communications Security$9771899 997 $aUNINA