| 
					LDR
				 | 02047nam a22005175i 4500 | 
|---|
| 001 | 42302 | 
|---|
| 003 | CONS | 
|---|
| 005 | 20130727041902.0 | 
|---|
| 007 | cr nn 008mamaa | 
|---|
| 008 | 120704s2012    gw |    s    |||| 0|eng d | 
|---|
| 020 |   |  . |  
			‡a9783642314483 
			‡9978-3-642-31448-3 | 
|---|
| 024 | 7 |  . |  
			‡a10.1007/978-3-642-31448-3 
			‡2doi | 
|---|
| 035 |   |  . |  
			‡a(DE-He213)978-3-642-31448-3 | 
|---|
| 050 |   | 4. |  
			‡aQA76.9.A25 | 
|---|
| 072 |   | 7. |  
			‡aUR 
			‡2bicssc | 
|---|
| 072 |   | 7. |  
			‡aUTN 
			‡2bicssc | 
|---|
| 072 |   | 7. |  
			‡aCOM053000 
			‡2bisacsh | 
|---|
| 100 | 1 |  . |  
			‡aSusilo, Willy. 
			‡eeditor. | 
|---|
| 245 | 1 | 0. |  
			‡aInformation Security and Privacy 
			‡h[electronic resource] : 
			‡b17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / 
			‡cedited by Willy Susilo, Yi Mu, Jennifer Seberry. | 
|---|
| 264 |   | 1. |  
			‡aBerlin, Heidelberg : 
			‡bSpringer Berlin Heidelberg : 
			‡bImprint: Springer, 
			‡c2012. | 
|---|
| 300 |   |  . |  
			‡aXIV, 460p. 46 illus. 
			‡bonline resource. | 
|---|
| 336 |   |  . |  
			‡atext 
			‡btxt 
			‡2rdacontent | 
|---|
| 337 |   |  . |  
			‡acomputer 
			‡bc 
			‡2rdamedia | 
|---|
| 338 |   |  . |  
			‡aonline resource 
			‡bcr 
			‡2rdacarrier | 
|---|
| 347 |   |  . |  
			‡atext file 
			‡bPDF 
			‡2rda | 
|---|
| 490 | 1 |  . |  
			‡aLecture Notes in Computer Science, 
			‡x0302-9743 ; 
			‡v7372 | 
|---|
| 650 |   | 0. |  
			‡aComputer science. | 
|---|
| 650 |   | 0. |  
			‡aData protection. | 
|---|
| 650 |   | 0. |  
			‡aData encryption (Computer science). | 
|---|
| 650 |   | 0. |  
			‡aCoding theory. | 
|---|
| 650 |   | 0. |  
			‡aInformation systems. | 
|---|
| 650 |   | 0. |  
			‡aInformation Systems. | 
|---|
| 650 | 1 | 4. |  
			‡aComputer Science. | 
|---|
| 650 | 2 | 4. |  
			‡aSystems and Data Security. | 
|---|
| 650 | 2 | 4. |  
			‡aData Encryption. | 
|---|
| 650 | 2 | 4. |  
			‡aManagement of Computing and Information Systems. | 
|---|
| 650 | 2 | 4. |  
			‡aCoding and Information Theory. | 
|---|
| 650 | 2 | 4. |  
			‡aComputer Appl. in Administrative Data Processing. | 
|---|
| 650 | 2 | 4. |  
			‡ae-Commerce/e-business. | 
|---|
| 700 | 1 |  . |  
			‡aMu, Yi. 
			‡eeditor. | 
|---|
| 700 | 1 |  . |  
			‡aSeberry, Jennifer. 
			‡eeditor. | 
|---|
| 710 | 2 |  . |  
			‡aSpringerLink (Online service) | 
|---|
| 773 | 0 |  . |  
			‡tSpringer eBooks | 
|---|
| 776 | 0 | 8. |  
			‡iPrinted edition: 
			‡z9783642314476 | 
|---|
| 830 |   | 0. |  
			‡aLecture Notes in Computer Science, 
			‡x0302-9743 ; 
			‡v7372 | 
|---|
| 856 | 4 | 0. |  
			‡uhttp://biblioteca.ipicyt.edu.mx:2048/login?url=http://dx.doi.org/10.1007/978-3-642-31448-3 
			‡yTexto completo 
			‡9CONS | 
|---|
| 950 |   |  . |  
			‡aComputer Science (Springer-11645) | 
|---|
| 901 |   |  . |  
			‡a42302 
			‡b 
			‡c42302 
			‡tbiblio 
			‡sSystem Local | 
|---|