1.

Record Nr.

UNISA996394754703316

Autore

L'Espine Jean de <ca. 1506-1597.>

Titolo

An excellent treatise of Christian righteousnes, written first in the French tongue by M.I. de l'Espine, and translated into English by I. Feilde for the comforte of afflicted consciences, verie necessarie and profitable to be reade of all Christians, as well for establishing them in the true doctrine of iustification, as also for enabling them to confute the false doctrine of all Papistes and heretickes [[electronic resource]]

Pubbl/distr/stampa

Imprinted at London, : By Thomas Vautrollier dwelling in the Blackfriers, 1577

Descrizione fisica

128 p

Altri autori (Persone)

FieldeJohn <d. 1588.>

Soggetti

Theology, Doctrinal

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Running title reads: Of Christian righteousnes.

Reproduction of the original in in the Bodleian Library.

Sommario/riassunto

eebo-0014



2.

Record Nr.

UNINA9910482739303321

Autore

Vormordsen Frands <1491-1551.>

Titolo

En oc tive de alder sköniste oc hugsualeligste Artickle, som alle menniske ere nøttelige ath vide til deris sielis salighed, uddragne aff den hellige scrifft, (Frantz Wormorssen) [[electronic resource]]

Pubbl/distr/stampa

Copenhagen, : Hans Vingaard, 1535

Descrizione fisica

Online resource ([8] bl.)

Lingua di pubblicazione

Danese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Reproduction of original in Det Kongelige Bibliotek / The Royal Library (Copenhagen).

3.

Record Nr.

UNINA9910410057003321

Titolo

Information Security Theory and Practice : 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings / / edited by Maryline Laurent, Thanassis Giannetsos

Pubbl/distr/stampa

Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020

ISBN

3-030-41702-6

Edizione

[1st ed. 2020.]

Descrizione fisica

1 online resource (X, 253 p. 91 illus., 29 illus. in color.)

Collana

Security and Cryptology, , 2946-1863 ; ; 12024

Disciplina

005.8

Soggetti

Data protection

Cryptography

Data encryption (Computer science)

Computer networks - Security measures

Computer networks

Application software

Data and Information Security

Cryptology

Mobile and Network Security

Computer Communication Networks

Computer and Information Systems Applications



Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Invited Paper -- How to Compartment Secrets - Trust Everybody, but Cut the Cards (Invited Talk) -- Authentication -- A Lattice-based Enhanced Privacy ID -- A Generic View on the Unified Zero-Knowledge Protocol and its Applications -- Cryptography -- Verifiable and Private Oblivious Polynomial Evaluation -- Monomial Evaluation of Polynomial Functions Protected by Threshold Implementations – With an Illustration on AES -- Strong Designated Verifier Signature Based on the Rank Metric -- A Lightweight Implementation of NTRU Prime for the Post-Quantum Internet of Things -- Threats -- Fault Injection Characterization on modern CPUs - From the ISA to the Micro-Architecture -- Threat Analysis of Poisoning Attack against Ethereum Blockchain -- A Template-based Method for the Generation of Attack Trees (short paper) -- Cybersecurity -- Analysis of QUIC Session Establishment and its Implementations -- CompactFlow: A Hybrid Binary Format for Network Flow Data -- SSI-AWARE: Self-Sovereign Identity Authenticated backup With Auditing by Remote Entities -- Internet of Things -- Automated Security Analysis of IoT Software Updates -- Towards a Context-Aware Security and Privacy as a Service in the Internet of Things (short paper).

Sommario/riassunto

This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.