000771453 000__ 01725cam\a2200457Ii\4500 000771453 001__ 771453 000771453 005__ 20230306142538.0 000771453 006__ m\\\\\o\\d\\\\\\\\ 000771453 007__ cr\un\nnnunnun 000771453 008__ 140904t20142015sz\a\\\\o\\\\\000\0\eng\d 000771453 0167_ $$a016884252$$2Uk 000771453 020__ $$a9783319098852$$q(electronic book) 000771453 020__ $$a3319098853$$q(electronic book) 000771453 020__ $$z9783319098845 000771453 0247_ $$a10.1007/978-3-319-09885-2$$2doi 000771453 035__ $$aSP(OCoLC)ocn889939106 000771453 035__ $$aSP(OCoLC)889939106 000771453 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dCOO$$dUKMGB$$dUWO$$dOCLCF$$dOCLCQ$$dOCLCO$$dIAO$$dIAS$$dIAD$$dJBG 000771453 049__ $$aISEA 000771453 050_4 $$aQA76.9.A25 000771453 08204 $$a005.8$$223 000771453 24500 $$aAdvanced research in data privacy /$$cGuillermo Navarro-Arribas, Vicenç Torra, editors. 000771453 264_1 $$aCham :$$bSpringer,$$c[2014] 000771453 264_4 $$c©2015 000771453 300__ $$a1 online resource (ix, 463 pages) :$$billustrations. 000771453 336__ $$atext$$btxt$$2rdacontent 000771453 337__ $$acomputer$$bc$$2rdamedia 000771453 338__ $$aonline resource$$bcr$$2rdacarrier 000771453 4901_ $$aStudies in Computational Intelligence,$$x1860-949X ;$$vvolume 567 000771453 5050_ $$aIntroduction -- Respondent Privacy -- User Privacy. 000771453 506__ $$aAccess limited to authorized users. 000771453 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed Sept. 4, 2014). 000771453 650_0 $$aData protection. 000771453 650_0 $$aComputer security. 000771453 7001_ $$aNavarro-Arribas, Guillermo,$$eeditor. 000771453 7001_ $$aTorra, Vicenç,$$eeditor. 000771453 830_0 $$aStudies in computational intelligence ;$$vv. 567. 000771453 85280 $$bebk$$hSpringerLink 000771453 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-09885-2$$zOnline Access$$91397441.1 000771453 909CO $$ooai:library.usi.edu:771453$$pGLOBAL_SET 000771453 980__ $$aEBOOK 000771453 980__ $$aBIB 000771453 982__ $$aEbook 000771453 983__ $$aOnline 000771453 994__ $$a92$$bISE