LEADER 02264nam0 22004693i 450 001 AQ10003617 005 20251003044040.0 010 $a0387572201$bNew York 010 $a3540572201$bBerlin 100 $a20110922d1993 ||||0itac50 ba 101 | $aeng 102 $ade 181 1$6z01$ai $bxxxe 182 1$6z01$an 200 1 $aAdvances in cryptology-Auscrypt '92$eWorkshop on the Theory and Application of Cryptographic Techniques$eGold Coast, Queensland, Australia, December 13-16,1992$eproceedings$fJennifer Seberry, Yuliang Zheng (eds.) 210 $aBerlin [etc.]$cSpringer$d1993 215 $aXIII, 542 p.$d24 cm 225 | $aLecture notes in computer science$fedited by G. Goos and J. Hartmanis$v718 410 0$1001MIL0030703$12001 $aLecture notes in computer science$fedited by G. Goos and J. Hartmanis$v718$1702 1$aGoos$b, Gerhard$3AQ1V006441$4340 606 $aElaboratori elettronici$xProgrammi$xProtezione$xCongressi$2FIR$3NAPC257710$9I 606 $aCrittografia $xCongressi$2FIR$3NAPC257711$9I 676 $a005.8$9SICUREZZA DEI DATI$v14 676 $a005.82$9Programmazione dei computer, programmi, dati. Sicurezza dei dati. Criptaggio dei dati$v22 696 $aConvegni$aCongressi e convegni$aProgrammi didattici$aProgrammi scolastici$aPiani di lavoro 696 $aConvegni$aCongressi e convegni 699 $aCongressi$yConvegni 699 $aCongressi$yCongressi e convegni 699 $aProgrammi$yProgrammi didattici 699 $aProgrammi$yProgrammi scolastici 699 $aProgrammi$zPiani di lavoro 699 $aCongressi$yConvegni 699 $aCongressi$yCongressi e convegni 702 1$aZheng$b, Yuliang$3AQ1V016040$4340 702 1$aSeberry$b, Jennifer$3UFIV059170$4340 710 12$aWorkshop on the Theory and Application of Cryptographic Techniques$f <1992$e ; Gold Coast>$3AQ1V001935$4070$0714578 801 3$aIT$bIT-000000$c20110922 850 $aIT-BN0095 912 $aAQ10003617 950 0$aBiblioteca Centralizzata di Ateneo$c193 v.$d 01COLL. ING. LNCS$e 0102 0000012915 VMA FD718 v. 718$fY $h19940907$i20110922 977 $a 01 996 $aAdvances in cryptology-Auscrypt '92$91381908 997 $aUNISANNIO