| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996418296503316 |
|
|
Titolo |
Security, privacy, and applied cryptography engineering : 10th international conference, SPACE 2020, Kolkata, India, December 17-21, 2020 : proceedings / / Lejla Batina, Stjepan Picek, Mainack Mondal (editors) |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2020] |
|
©2020 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2020.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 259 p. 87 illus., 37 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture notes in computer science ; ; 12586 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
tPAKE: Typo-Tolerant Password-Authenticated Key Exchange -- PAS-TA-U: PASsword-based Threshold Authentication with Password Update -- Re-Markable: Stealing Watermarked Neural Networks through Synthesis -- Robust Adaptive Cloud Intrusion Detection System using Advanced Deep Reinforcement Learning -- A Forensic Technique to Detect Copy-Move Forgery based on Image Statistics -- ExtPFA: Extended Persistent Fault Analysis for Deeper Rounds of Bit Permutation based ciphers with a case study on GIFT -- On Configurable SCA Countermeasures Against Single Trace Attacks for the NTT -- HEDrone: Privacy-Preserving Proof-of-Alibi for Drone Compliance Based on Homomorphic Encryption -- Fiat-Shamir with Aborts: From Identification Schemes to Linkable Ring Signatures -- An Insecurity Study of Ethereum Smart Contracts -- Cryptographically Secure Multi-Tenant Provisioning of FPGAs -- Experimental results on higher-order differential spectra of 6 and 8-bit invertible S-boxes -- Quantum Resource Estimates of Grover’s Key Search on ARIA. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 10th International Conference on Security, Privacy, and Applied Cryptography Engineering, SPACE 2020, held in Kolkata, India, in |
|
|
|
|
|
|
|
|
|
|
|
|
|
December 2020. Due to COVID-19 pandemic, the conference was held virtual. The 13 full papers presented were carefully reviewed and selected from 48submissions. This annual event is devoted to various aspects of security, privacy, applied cryptography, and cryptographic engineering. This is a very challenging field, requiring the expertise from diverse domains, ranging from mathematics to solid-state circuit design. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910784281103321 |
|
|
Autore |
Pretto-Sakmann Arianna |
|
|
Titolo |
Boundaries of personal property law : shares and sub-shares / Arianna Pretto-Sakman |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Oxford ; Portland, Oregon, : Hart Publishing, 2005 |
|
|
|
|
|
|
|
ISBN |
|
1-4725-5974-6 |
1-280-81405-5 |
9786610814053 |
1-84731-102-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (273 p.) |
|
|
|
|
|
|
Classificazione |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
|
|
Soggetti |
|
Personal property - England |
Personal property - Wales |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (pages [221]-235) and index |
|
|
|
|
|
|
Nota di contenuto |
|
PART I PROSPECT -- 1 Introduction -- 2 The Condition of Personal Property -- 3 Terminology -- PART II LOCANDA -- 4 Shares as Things -- 5 The First External Boundary: Property as Rights In Rem -- PART III ALIENANDA -- 6 Traditional Modes of Alienation -- 7 New Modes of Alienation -- 8 The Second External Boundary: Property as Alienability -- PART IV VINDICANDA -- 9 Protection of Entitlement to Shares and Sub-shares -- 10 The Third External Boundary: Property as Vindicability -- PART V RETROSPECT -- 11 Conclusion |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This study of the boundaries of personal property has an inward and an |
|
|
|
|
|
|
|
|
|
|
outward perspective, with the intellectual emphasis on the latter. The inward-looking inquiry considers shares as items of personal property. Nowadays those who think of themselves as shareholders often stand one step removed from the share itself. They hold what this book christens a sub-share. This part of the book asks in what sense shares and sub-shares can be conceived to be things, how those things are alienated, and how they are protected in litigation. The outward-looking inquiry then asks whether personal property can be contemplated as a sub-category of the law of things and, more particularly, as the law of all things locatable in space, alienable, or vindicable in court. The outward inquiry considers three boundaries. Within the law of property the line between realty and personalty proves relatively uncontroversial; the second boundary lies between property and obligations; the third between wealth and non-wealth. The second boundary is the main concern. Respect for it necessitates a differentiation between the law of property in the strict sense and the all-encompassing law of wealth, even where the consequence might be to exclude shares and sub-shares from the law of property. In maintaining the value of careful proprietary taxonomy and in reviving the underlying concepts on which it depends, this book opposes modern scepticism as to the possibility and desirability of precision in legal classification. In these commitments it could fairly be styled a post-modern study of personal property. Winner of the SLS Birks Prize for Outstanding Legal Scholarship 2006 - Second Prize |
|
|
|
|
|
| |