LEADER 01565oam 2200469zu 450 001 9910376495903321 005 20250917190758.0 035 $a(CKB)3170000000002761 035 $a(SSID)ssj0001138557 035 $a(PQKBManifestationID)11632699 035 $a(PQKBTitleCode)TC0001138557 035 $a(PQKBWorkID)11171955 035 $a(PQKB)10291850 035 $a(WaSeSS)IndRDA00015085 035 $a(Association for Computing Machinery)10.1145/1180337 035 $a(EXLCZ)993170000000002761 100 $a20160829d2006 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aProceedings of the fourth ACM Workshop on Formal methods in Security 210 31$a[Place of publication not identified]$cACM$d2006 215 $a1 online resource (78 pages) 225 1 $aACM Conferences 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a1-59593-550-9 410 0$aACM Conferences 517 1 $aProceedings of the fourth Association for Computing Machinery Workshop on Formal methods in Security 606 $aEngineering & Applied Sciences$2HILCC 606 $aComputer Science$2HILCC 615 7$aEngineering & Applied Sciences 615 7$aComputer Science 702 $aWinslett$b Marianne Southall 702 $aGordon$b Andrew D. 712 02$aACM Digital Library. 801 0$bPQKB 906 $aBOOK 912 $a9910376495903321 996 $aProceedings of the fourth ACM Workshop on Formal methods in Security$91910385 997 $aUNINA