LEADER 01425nam2-2200397---450- 001 990003404040203316 005 20100524154701.0 010 $a978-3-642-11144-0 035 $a000340404 035 $aUSA01000340404 035 $a(ALEPH)000340404USA01 035 $a000340404 100 $a20100524d2009----km-y0itay0103----ba 101 $aeng 102 $aDE 105 $aa|||||||001yy 200 1 $aInformation and communications security$e11th international conference, ICICS 2009$eBeijing, China, december 14-17, 2009$eproceedings$fSihan Qing, Chris J. Mitchell, Guilin Wang (Eds.) 210 $aBerlin [etc.]$cSpringer$dcopyr. 2009 215 $aXIV, 504 p.$cill.$d24 cm 225 2$aLecture notes in computer science$v5927 410 0$1001000314960$12001$aLecture notes in computer science 606 $aArchivi di dati$xSicurezza$xAtti di congressi$2BNCF 606 $aTelecomunicazioni$xSicurezza$xAtti di congressi$2BNCF 676 $a005.821 702 1$aQING,$bSihan 702 1$aMITCHELL,$bChris J. 702 1$aWANG,$bGuilin 710 12$aInternational conference, ICICS 2009$d<11.;$f2009;$eBeijing>$0607724 801 0$aIT$bsalbc$gISBD 912 $a990003404040203316 951 $a001 LNCS 5927$b39087/CBS$c001$d00335532 959 $aBK 969 $aSCI 979 $aANGELA$b90$c20100524$lUSA01$h1547 996 $aInformation and communications security$91126404 997 $aUNISA