000863047 000__ 02275cam\a2200529Ii\4500 000863047 001__ 863047 000863047 005__ 20230306145611.0 000863047 006__ m\\\\\o\\d\\\\\\\\ 000863047 007__ cr\cn\nnnunnun 000863047 008__ 190213s2019\\\\sz\a\\\\o\\\\\101\0\eng\d 000863047 019__ $$a1089997961 000863047 020__ $$a9783030129422$$q(electronic book) 000863047 020__ $$a303012942X$$q(electronic book) 000863047 020__ $$z9783030129415 000863047 0247_ $$a10.1007/978-3-030-12942-2$$2doi 000863047 035__ $$aSP(OCoLC)on1085540336 000863047 035__ $$aSP(OCoLC)1085540336$$z(OCoLC)1089997961 000863047 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dUKMGB$$dOCLCF$$dOCLCO$$dDKU 000863047 049__ $$aISEA 000863047 050_4 $$aQA76.9.A25 000863047 08204 $$a005.8$$223 000863047 1112_ $$aInternational Conference on Security for Information Technology and Communications$$n(11th :$$d2018 :$$cBucharest, Romania) 000863047 24510 $$aInnovative security solutions for information technology and communications :$$b11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised selected papers /$$cJean-Louis Lanet, Cristian Toma (eds.). 000863047 2463_ $$aSecITC 2018 000863047 264_1 $$aCham, Switzerland :$$bSpringer,$$c2019. 000863047 300__ $$a1 online resource (xiii, 530 pages) :$$billustrations. 000863047 336__ $$atext$$btxt$$2rdacontent 000863047 337__ $$acomputer$$bc$$2rdamedia 000863047 338__ $$aonline resource$$bcr$$2rdacarrier 000863047 347__ $$atext file$$bPDF$$2rda 000863047 4901_ $$aLecture notes in computer science ;$$v11359 000863047 4901_ $$aLNCS sublibrary. SL 4, Security and cryptology 000863047 500__ $$aIncludes author index. 000863047 506__ $$aAccess limited to authorized users. 000863047 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 13, 2019). 000863047 650_0 $$aComputer security$$vCongresses. 000863047 650_0 $$aComputer networks$$xSecurity measures$$vCongresses. 000863047 650_0 $$aInformation technology$$xSecurity measures$$vCongresses. 000863047 7001_ $$aLanet, Jean-Louis,$$eeditor. 000863047 7001_ $$aToma, Cristian,$$eeditor. 000863047 77608 $$iPrinted edition:$$z9783030129415 000863047 830_0 $$aLecture notes in computer science ;$$v11359. 000863047 830_0 $$aLNCS sublibrary.$$nSL 4,$$pSecurity and cryptology. 000863047 852__ $$bebk 000863047 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-12942-2$$zOnline Access$$91397441.1 000863047 909CO $$ooai:library.usi.edu:863047$$pGLOBAL_SET 000863047 980__ $$aEBOOK 000863047 980__ $$aBIB 000863047 982__ $$aEbook 000863047 983__ $$aOnline 000863047 994__ $$a92$$bISE