*001779270
*00520250613103950.0
*007ta
*008150401s2000 gw 100 u eng d
*00902034cam a2200457 c 4500
*019 $bl
*020 $a3540677429$qh.
*035 $a(EXLNZ-47BIBSYS_NETWORK)990010464114702201
*035 $a(NO-LaBS)14305508(bibid)
*035 $a(NO-TrBIB)001046411
*035 $a001046411-47bibsys_network
*040 $aNO-TrBIB$bnob$ekatreg
*080 $a004.6.056
*080 $a342.721
*084 $aD.4.6$2acmccs
*084 $aE.3.0$2acmccs
*084 $aK.4.1$2acmccs
*084 $aK.6.5$2acmccs
*084 $aL 1610$qNoOU$2utklklass
*084 $aL 164.2$qNoOU$2utklklass
*1112 $aACISP 2000$0(NO-TrBIB)45811$_105279700
*24510$aInformation security and privacy :$b5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000 : proceedings$cEd Dawson, Andrew Clark, Colin Boyd (eds.)
*260 $aBerlin$bSpringer$cc2000
*300 $aXII, 488 s.$bill.
*4901 $aLecture notes in computer science$v1841
*650 7$aDatasikkerhet$2tekord$9nob$vKongresser$_187404500
*650 7$aPersonvern$0(NO-TrBIB)REAL000558$2noubomn$_185668000
*650 7$aPersonvern$2tekord$9nno$vKongresser$_187143300
*653 $apersonvern$adatasikkerhet$akonferanser$_63227300
*7001 $aBoyd, Colin$0(NO-TrBIB)90887255$_62352600
*7001 $aClark, Andrew J.$d1971-$0(NO-TrBIB)45810$_105279800
*7001 $aDawson, Ed$0(NO-TrBIB)90885882$_105279900
*7760 $tInformation Security and Privacy : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings$w990704684514702201
*830 0$aLecture notes in computer science$v1841$_13074400
*85642$3Forlagets beskrivelse (kort)$uhttps://contents.bibs.aws.unit.no/?isbn=3540677429
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/?isbn=3540677429
*85642$3Forlagets beskrivelse (lang)$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540677420
*85642$3Innholdsfortegnelse$uhttps://contents.bibs.aws.unit.no/content/?isbn=9783540677420
*85642$3Omslagsbilde$uhttps://contents.bibs.aws.unit.no/files/images/large/0/2/9783540677420.jpg$qimage/jpeg
*901 $a80
*999 $aoai:nb.bibsys.no:990010464114702202$b2021-11-14T20:49:20Z$z990010464114702202
^