| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISOBSOBE00045822 |
|
|
Autore |
Da Ponte, Lorenzo |
|
|
Titolo |
Versi composti da Lorenzo da Ponte per la morte d'Anna Celestina Ernestina, sua virtuosissima e adorata consorte / Lorenzo Da Ponte |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York : J.H. Turney, 1832 |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNISA996525669303316 |
|
|
Titolo |
Advances in cryptology - eurocrypt 2023 : 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23-27, 2023,proceedings, part II / / edited by Carmit Hazay and Martijn Stam |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2023] |
|
©2023 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2023.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XVI, 628 p. 73 illus., 13 illus. in color.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 14005 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Computers Access control |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This five-volume set, LNCS 14004 - 14008 constitutes the refereed proceedings of the 42nd Annual International Conference on Theory and Applications of Cryptographic Techniques, Eurocrypt 2023, which |
|
|
|
|
|
|
|
|
|
|
was held in Lyon, France, in April 2023. The total of 109 full papers presented were carefully selected from 415 submissions. They are organized in topical sections as follows: Theoretical Foundations; Public Key Primitives with Advanced Functionalities; Classic Public Key Cryptography; Secure and Efficient Implementation, Cryptographic Engineering, and Real-World Cryptography; Symmetric Cryptology; and finally Multi-Party Computation and Zero-Knowledge. |
|
|
|
|
|
| |