LEADER 02208nam 2200613Ia 450 001 9910456178503321 005 20200520144314.0 010 $a1-280-17989-9 010 $a9786610179893 010 $a0-309-52654-X 035 $a(CKB)111069351132904 035 $a(SSID)ssj0000271414 035 $a(PQKBManifestationID)11213333 035 $a(PQKBTitleCode)TC0000271414 035 $a(PQKBWorkID)10293581 035 $a(PQKB)10002154 035 $a(MiAaPQ)EBC3375852 035 $a(Au-PeEL)EBL3375852 035 $a(CaPaEBR)ebr10046903 035 $a(OCoLC)923259383 035 $a(EXLCZ)99111069351132904 100 $a20030929d2003 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aWho goes there?$b[electronic resource] $eauthentication through the lens of privacy /$fCommittee on Authentication Technologies and Their Privacy Implications, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Stephen T. Kent and Lynette I. Millett, editors 210 $aWashington, D.C. $cNational Academies Press$dc2003 215 $axviii, 232 p 300 $aChair: Stephen T. Kent. 311 $a0-309-08896-8 320 $aIncludes bibliographical references. 606 $aPrivacy, Right of$zUnited States 606 $aComputer networks$xLaw and legislation$zUnited States 606 $aComputer security$zUnited States 606 $aComputer networks$xSecurity measures$zUnited States 606 $aInternet$xLaw and legislation$zUnited States 608 $aElectronic books. 615 0$aPrivacy, Right of 615 0$aComputer networks$xLaw and legislation 615 0$aComputer security 615 0$aComputer networks$xSecurity measures 615 0$aInternet$xLaw and legislation 676 $a342.7308/58 701 $aKent$b Stephen T$g(Stephen Thomas)$01037407 701 $aMillett$b Lynette I$0877611 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910456178503321 996 $aWho goes there$92479858 997 $aUNINA