LEADER 00810nam a2200253 i 4500 001 991001532079707536 005 20020502200046.0 008 941021s1986 uk ||| | eng 020 $a0413288900 035 $ab11526592-39ule_inst 035 $aPRUMB62913$9ExL 040 $aDip. SSC$bita 082 04$a821 100 1 $aSoyinka, Wole$0144610 245 12$aA shuttle in the crypt /$cWole Soyinka 260 $aMethuen :$bCollings,$c1986 300 $a89 p. ;$c20 cm 651 4$aNigeria$xPoesie 907 $a.b11526592$b21-10-10$c01-07-02 912 $a991001532079707536 945 $aLE021 FH10E73$g1$i2021000202995$lle021$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i11723026$z01-07-02 996 $aShuttle in the crypt$9814807 997 $aUNISALENTO 998 $ale021$b01-01-94$cm$da $e-$feng$guk $h2$i1 LEADER 01803nam 22005175u 450 001 9910746499303321 005 20231201190212.0 035 $a(CKB)28450160500041 035 $a(NyNyACM)10.1145/3595353 035 $a(Association for Computing Machinery)10.1145/3595353 035 $a(EXLCZ)9928450160500041 100 $a20231101d2023 uy 101 0 $aeng 135 $aurnn#---mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes /$fEdited by Simon S. Woo, Shahroz Tariq, Sharif Abuadbba, Kristen Moore 210 1$aNew York, New York, United States :$cAssociation for Computing Machinery,$d2023. 215 $a1 online resource (37 pages) 225 0 $aACM Conferences. 300 $aTitle from The ACM Digital Library. 311 $a9798400702037 410 0$aACM Conferences 517 3 $aWDC '23 606 $aComputer science 606 $aVirtual reality 606 $aInformation extraction 606 $aIdentity theft 615 0$aComputer science. 615 14$aVirtual reality 615 24$aInformation extraction 615 24$aIdentity theft 701 $aWoo$b Simon S$01385195 701 $aTariq$b Shahroz$01436706 701 $aAbuadbba$b Sharif$01436707 701 $aMoore$b Kristen$01436708 712 02$aACM Digital Library. 712 02$aAssociation for Computing Machinery.$bSpecial Interest Group on Security, Audit, and Control. 712 02$aACM SIGs 801 0$bAssociation for Computing Machinery 801 1$bACM 906 $aBOOK 912 $a9910746499303321 996 $aProceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes$93595874 997 $aUNINA