LEADER 01410nam2-2200397---450- 001 990003169760203316 005 20081104170905.0 010 $a978-3-540-88624-2 035 $a000316976 035 $aUSA01000316976 035 $a(ALEPH)000316976USA01 035 $a000316976 100 $a20081104d2008----km-y0itay0103----ba 101 $aeng 102 $aDE 105 $aa|||||||001yy 200 1 $aInformation and communications security$e10th international conference, ICICS 2008$eBirmingham, UK, October 20-22, 2008$eProceedings$fLiqun Chen, Mark D. Ryan, Guilin Wang (Eds.) 210 $aBerlin [etc.]$cSpringer$dcopyr. 2008 215 $aXIII, 436 p.$cill.$d24 cm 225 2 $aLecture notes in computer science$v5308 410 0$12001$aLecture notes in computer science 606 $aArchivi di dati$xSicurezza$xCongressi$yBirmingham$z2008 606 $aTelecomunicazioni$xSicurezza$xCongressi$yBirmingham$z2008 676 $a005.821 702 1$aCHEN,$bLiqun 702 1$aRYAN,$bMark D. 702 1$aWANG,$bGuilin 710 12$aInternational conference, ICICS 2008$d<10. ;$f2008 ;$eBirmingham>$0602655 801 0$aIT$bCBS$gISBD 912 $a990003169760203316 951 $a001 LNCS 5308$b37609/CBS$c001$d00217828 959 $aBK 969 $aSCI 979 $aCBAS$b10$c20081104$lUSA01$h1709 996 $aInformation and communications security$91014544 997 $aUNISA