| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996397309303316 |
|
|
Autore |
Gifford George <1547 or 8-1600.> |
|
|
Titolo |
A briefe discourse of certaine points of the religion which is among the common sort of Christians, which may bee termed the countrie diuinitie [[electronic resource] ] : With a manifest confutation of the same, after the order of a dialogue / / compiled by George Gifforde |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Imprinted at London, : for Toby Cook dwelling at the Tigres head in Paules churchyard and are there to bee solde., 1581 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Soggetti |
|
Puritans - England |
Pastoral theology - Church of England |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Running title: Country diuinity. |
A₁r line 4 of heading ends 'Countrie'; A₁r catchword: 'Ath. We'; t.p. border has init. 'T D'. |
Numerous errors in paging. |
Signatures: A-K⁸, L⁴. |
Imperfect: stained, and with print show-through, and loss of text. |
Reproduction of original in: Harvard University. Library. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996466422703316 |
|
|
Titolo |
Information Theoretic Security [[electronic resource] ] : 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings / / edited by Junji Shikata |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 235 p. 31 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 10681 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Coding theory |
Information theory |
Computer communication systems |
Software engineering |
Mathematical statistics |
Optical data processing |
Systems and Data Security |
Coding and Information Theory |
Computer Communication Networks |
Software Engineering |
Probability and Statistics in Computer Science |
Image Processing and Computer Vision |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges. |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges. |
|
|
|
|
|
|
|
| |