| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910130813003321 |
|
|
Autore |
Romano Donato |
|
|
Titolo |
How safe is eating chicken? : a study on the impact of trust and food risk communication on consumer behaviour in the European Union / / edited by Donato Romano and Gianluca Stefani |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Firenze University Press, 2006 |
|
Florence, Italy : , : Firenze University Press, , c2006 |
|
|
|
|
|
|
|
|
|
ISBN |
|
9788864531090 |
8864531092 |
8884534968 |
9788884534965 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (153 pages) : illustrations |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
RomanoDonato |
StefaniGianluca |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Health risk communication |
Health risk communication - European Union countries |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
Consumers trust is a key factor in dealing with rising concerns about food safety and food quality, but only few studies have dealt with consumer attitudes and none of them has tried to model the process of consumer response. This book reports the main findings of an european project aimed at analysing trust along the food chain and its relationship with food risk communication. The papers collected investigate the mechanisms that determine the social diffusion of trust, examining the interplay of the psychological, sociological and economic factors; and analyze the impact of the food risk communication policies on consumers and producers and on the society as a whole. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNISA996217053703316 |
|
|
Titolo |
Somatic cell and molecular genetics |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York, NY, : Kluwer Academic Publishers |
|
|
|
|
|
|
|
ISSN |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cytogenetics |
Molecular genetics |
Cytogenetics - Periodicals |
Molecular genetics - Periodicals |
Somatic hybrids |
Molecular Biology |
Hybrid Cells |
Cytogénétique - Périodiques |
Génétique moléculaire - Périodiques |
Cytogénétique |
Génétique moléculaire |
Hybrides cellulaires |
Periodical |
Periodicals. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Periodico |
|
|
|
|
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNISA996635667103316 |
|
|
Autore |
Chung Kai-Min |
|
|
Titolo |
Advances in Cryptology – ASIACRYPT 2024 : 30th International Conference on the Theory and Application of Cryptology and Information Security, Kolkata, India, December 9–13, 2024, Proceedings, Part II / / edited by Kai-Min Chung, Yu Sasaki |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (500 pages) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 1611-3349 ; ; 15485 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Computer networks |
Application software |
Data protection |
Computer networks - Security measures |
Cryptology |
Computer Communication Networks |
Computer and Information Systems Applications |
Security Services |
Mobile and Network Security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
digital signatures -- public-key cryptography -- pairing-based cryptography. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The 9 volume set LNCS 15484-15492 constitutes the refereed proceedings of the 30th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2024, which took place in Kolkata, India, during December 9–13, 2024. The 127 full papers included in the proceedings were carefully reviewed and selected from 433 submissions. They were organized in topical sections as follows: Advances Primitives; homomorphic encryption; digital signatures; public-key cryptography; pairing-based |
|
|
|
|
|
|
|
|
|
|
cryptography, threshold cryptography; isogeny-based cryptography; post-quantum cryptography; secure data structures; lattice-based cryptography; lattice assumptions; key exchange protocols; succinct arguments; verifiable computation, zero-knowledge protocols; secure multiparty computation; blockchain protocols; information theoretic cryptography; secret sharing; security against physical attacks; cryptanalysis on symmetric-key schemes; cryptanalysis on public-key schemes; fault attacks and side-channel analysis; cryptanalysis on various problems; quantum cryptanalysis; quantum cryptography; symmetric-key cryptography. |
|
|
|
|
|
| |