000 01630nam a22003975a 4500
005 20250914164845.0
006 m d
007 cr nn 008maaau
008 090212s2006 gw q j eng d
020 _a9783540354598 (electronic bk.)
020 _a9783540354581 (paper)
035 _a(Springer)978-3-540-35458-1
039 9 _a200902121950
_bmuhaimin
_y04-04-2008
_zmuhaimin
050 0 0 _aQA76.9.A25
_bA279 2006
082 0 0 _a005.8
_222
090 _aQA76.9.A25
_bA181 2006
111 2 _aACISP 2006
_d(2006 :
_cMelbourne, Vic.)
245 1 0 _aInformation Security and Privacy (vol. # 4058)
_h[electronic resource] :
_b11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings /
_cedited by Lynn Batten, Reihaneh Safavi-Naini.
260 _aBerlin Heidelberg :
_bSpringer-Verlag GmbH.,
_c2006
300 _axii, 446 p. :
_bill., digital ;
_c24 cm.
440 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4058
650 0 _aComputers
_xAccess control
_vCongresses.
650 0 _aComputer security
_vcongresses.
650 0 _aData protection
_vCongresses.
700 1 _aBatten, Lynn.
700 1 _aSafavi-Naini, Reihaneh.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer e-books
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://dx.doi.org/10.1007/11780656
907 _a.b14144578
_b2025-04-08
_c2019-11-12
942 _n0
_kQA76.9.A25 A181 2006
914 _avtls003372024
998 _ae
_b2008-04-04
_cm
_dz
_feng
_ggw
_y0
_z.b14144578
999 _c410437
_d410437