*001711548
*00520250613104158.0
*007ta
*008110916s2005 gw 100 u eng d
*00902028cam a2200433 c 4500
*019 $bl
*020 $a3540260013$qh.
*020 $a9783540260011$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990600895474702201
*035 $a(NO-LaBS)13446337(bibid)
*035 $a(NO-TrBIB)060089547
*035 $a060089547-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.6.056
*1112 $aHIP 2005$0(NO-TrBIB)6004448$_99468900
*24510$aHuman interactive proofs :$bsecond international workshop, HIP 2005, Bethlehem, PA, USA, May 19-20, 2005 : proceedings$cHenry S. Baird, Daniel P. Lopresti (eds.)
*260 $aBerlin$bSpringer$cc2005
*300 $aVI, 141 s.$bill.
*4901 $aLecture notes in computer science$v3517
*650 0$aComputer network protocols$_25955100
*650 0$aComputer security$_10202500
*650 0$aComputers$xAccess control$_21522500
*650 0$aPattern recognition systems$_36149200
*650 7$aBiometri$2tekord$_185601300
*650 7$aDatasikkerhet$2tekord$9nob$vKongresser$_187404500
*7001 $aBaird, Henry S.$0(NO-TrBIB)90122937$_99469000
*7001 $aLopresti, Daniel P.$0(NO-TrBIB)98030999$_99469100
*7760 $tHIP 2005$w990602077794702201
*830 0$aLecture notes in computer science$v3517$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540260011
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540260013
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540260011
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540260011
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/1/1/9783540260011.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/1/1/9783540260011.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/3/1/3540260013.jpg$qimage/jpeg
*85642$uhttp://springerlink.metapress.com/openurl.asp?genre=issue&issn=
*901 $a80
*999 $aoai:nb.bibsys.no:990600895474702202$b2021-11-14T20:44:00Z$z990600895474702202
^