*001136058
*00520250613104156.0
*007ta
*008090616s2002 gw 100 u eng d
*00901871cam a2200445 c 4500
*019 $bl
*020 $a3540438610$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990218808164702201
*035 $a(NO-LaBS)14491500(bibid)
*035 $a(NO-TrBIB)021880816
*035 $a021880816-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.6.056
*080 $a342.721
*084 $aD.4.6$2acmccs
*084 $aE.3.0$2acmccs
*084 $aK.6.5$2acmccs
*1112 $aACISP 2002$0(NO-TrBIB)2135546$_35506000
*24510$aInformation security and privacy :$b7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings$cLynn Batten, Jennifer Seberry (eds.)
*260 $aBerlin$bSpringer$cc2002
*300 $aXII, 514 s.$bill.
*4901 $aLecture notes in computer science$v2384
*650 0$aData protection$_20387100
*650 0$aPrivacy, Right of$_20387200
*650 7$aDatasikkerhet$0(NO-TrBIB)REAL005212$2noubomn$_185599800
*650 7$aDatasikkerhet$2tekord$9nob$vKongresser$_187404500
*650 7$aPersonvern$0(NO-TrBIB)REAL000558$2noubomn$_185668000
*650 7$aPersonvern$2tekord$9nno$_187143300
*7001 $aBatten, Lynn Margaret$0(NO-TrBIB)90503616$_35506100
*7001 $aSeberry, Jennifer$0(NO-TrBIB)90345001$_35506200
*7760 $tACISP 2002$w990229926694702201
*7760 $tACISP 2002$w990704711504702201
*830 0$aLecture notes in computer science$v2384$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/?isbn=3540438610
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540438610
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540438618
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540438618
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/8/1/9783540438618.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990218808164702202$b2021-11-14T19:51:20Z$z990218808164702202
^