1.

Record Nr.

UNINA990009192590403321

Autore

Christie's <Geneva >

Titolo

Magnificent jewels = = Superbes bijoux : which will be sold at auction by Christie's (International) S.A. at the hotel Richemond in Geneva : Thursday, May 14, 1987 / Christie's

Pubbl/distr/stampa

Geneva : Christie's, 1987

Descrizione fisica

282 p. : ill. ; 28 cm

Locazione

DARST

Collocazione

30.259

Lingua di pubblicazione

Inglese

Francese

Formato

Materiale a stampa

Livello bibliografico

Monografia

2.

Record Nr.

UNISA996465650103316

Titolo

Security and Cryptography for Networks [[electronic resource] ] : 10th International Conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016, Proceedings / / edited by Vassilis Zikas, Roberto De Prisco

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016

ISBN

3-319-44618-5

Edizione

[1st ed. 2016.]

Descrizione fisica

1 online resource (XIX, 606 p. 75 illus.)

Collana

Security and Cryptology ; ; 9841

Disciplina

005.82

Soggetti

Data encryption (Computer science)

Computer security

Management information systems

Computer science

Computer communication systems

Cryptology

Systems and Data Security

Management of Computing and Information Systems

Computer Communication Networks



Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Encryption -- Memory Protection -- Multi-party Computation -- Zero-knowledge Proofs -- Efficient Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation -- Secret Sharing -- Obfuscation.

Sommario/riassunto

This book constitutes the proceedings of the 10th International Conference on Security and Cryptography, SCN 2016, held in Amalfi, Italy, in August/September 2016. The 30 papers presented in this volume were carefully reviewed and selected from 67 submissions. They are organized in topical sections on encryption; memory protection; multi-party computation; zero-knowledge proofs; efficient protocols; outsourcing computation; digital signatures; cryptanalysis; two-party computation; secret sharing; and obfuscation.