| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNICAMPANIASUN0058012 |
|
|
Titolo |
1.3: Atleti e guerrieri : tradizioni aristocratiche a Taranto tra 6. e 5. sec. a. C. : catalogo della mostra, Taranto, Museo nazionale archeologico, 9 aprile 1994 / testi di Amelia D'Amicis ... [et al.] |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Taranto : La colomba, stampa 1997 |
|
|
|
|
|
|
|
Descrizione fisica |
|
XV, 478 p. : ill. ; 30 cm. |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNISA996465937003316 |
|
|
Titolo |
Provable Security [[electronic resource] ] : 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings / / edited by Xavier Boyen, Xiaofeng Chen |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2011.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XIII, 399 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 6980 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer communication systems |
Management information systems |
Computer science |
Algorithms |
Computer security |
Computers and civilization |
Cryptology |
Computer Communication Networks |
Management of Computing and Information Systems |
Algorithm Analysis and Problem Complexity |
Systems and Data Security |
Computers and Society |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 5th Provable Security Conference held in in Xi'an, China, in October 2011. The 22 full papers presented together with 4 short papers and 2 invited talks were carefully reviewed and selected from 75 submissions. The papers are divided in topical sections on cryptographic primitives; encryption; cryptographic protocols; security models and framework; and key agreement. |
|
|
|
|
|
|
|
| |