*001856426
*00520250613104405.0
*007ta
*008110907s2006 gw 100 u eng d
*00901739cam a2200361 c 4500
*019 $bl
*020 $a3540354581$qh.
*020 $a9783540354581$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990702891234702201
*035 $a(NO-LaBS)14149154(bibid)
*035 $a(NO-TrBIB)070289123
*035 $a070289123-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.6.056
*080 $a342.721
*1112 $aACISP 2006$0(NO-TrBIB)7015657$_111669000
*24510$aInformation security and privacy :$b11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings$cLynn Margaret Batten, Reihaneh Safavi-Naini (eds.)
*260 $aBerlin$bSpringer$cc2006
*300 $aXII, 446 s.$bill.
*4901 $aLecture notes in computer science$v4058
*650 7$aDatasikkerhet$2tekord$9nob$vKongresser$_187404500
*650 7$aPersonvern$2tekord$9nno$_187143300
*7001 $aBatten, Lynn Margaret$0(NO-TrBIB)90503616$_35506100
*7001 $aSafavi-Naini, Reihanah$0(NO-TrBIB)90832534$_66097200
*7760 $tInformation Security and Privacy (vol. # 4058) : 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings$w990809031004702201
*830 0$aLecture notes in computer science$v4058$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/?isbn=9783540354581
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=9783540354581
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/?isbn=9783540354581
*85642$3Miniatyrbilde$uhttps://contents.bibs.aws.unit.no/files/images/small/1/8/9783540354581.jpg$qimage/jpeg
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/1/8/9783540354581.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990702891234702202$b2021-11-14T20:54:31Z$z990702891234702202
^