01716nlm0 22004691i 450 9900092631304033219783642050312000926313FED01000926313(Aleph)000926313FED0100092631320100926d2009----km-y0itay50------baengDEdrnn-008mamaaTesting of Software and Communication SystemsRisorsa elettronica21st IFIP WG 6.1 International Conference, TESTCOM 2009 and 9th International Workshop, FATES 2009, Eindhoven, The Netherlands, November 2-4, 2009. Proceedingsedited by Manuel Núñez, Paul Baker, Mercedes G. MerayoBerlin ; HeidelbergSpringer2009Lecture Notes in Computer Science0302-97435826Documento elettronicoTestoFormato html, pdfBaker,PaulMerayo,Mercedes G.Nunez,ManuelITUNINAREICATUNIMARCFull text per gli utenti Federico IIhttp://dx.doi.org/10.1007/978-3-642-05031-2EB990009263130403321Algorithm Analysis and Problem ComplexityComputer scienceComputer ScienceComputer simulationComputer softwareLogic designLogics and Meanings of ProgramsProgramming Languages, Compilers, InterpretersProgramming TechniquesSimulation and ModelingSoftware engineeringSoftware EngineeringTesting of Software and Communication Systems773764UNINA07320nam 22009375 450 99646628060331620200703211221.03-642-14992-810.1007/978-3-642-14992-4(CKB)2670000000036371(SSID)ssj0000446467(PQKBManifestationID)11297676(PQKBTitleCode)TC0000446467(PQKBWorkID)10496160(PQKB)11777888(DE-He213)978-3-642-14992-4(MiAaPQ)EBC3065621(PPN)14901855X(EXLCZ)99267000000003637120100809d2010 u| 0engurnn#008mamaatxtccrFinancial Cryptography and Data Security[electronic resource] FC 2010 Workshops, WLC, RLCPS, and WECSR, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers /edited by Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M Miret, Kazue Sako, Francesc Sebé1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (XII, 256 p.)Security and Cryptology ;6054Bibliographic Level Mode of Issuance: Monograph3-642-14991-X Includes bibliographical references and index.WLC Preface -- Hummingbird: Ultra-Lightweight Cryptography for Resource-Constrained Devices -- Lighten Encryption Schemes for Secure and Private RFID Systems -- Analysis and Improvement of a Pseudorandom Number Generator for EPC Gen2 Tags -- A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results -- Reliable Food Traceability Using RFID Tagging -- Lightweight Cryptography and DPA Countermeasures: A Survey -- Securing the Use of RFID-Enabled Banknotes -- Increasing Privacy Threats in the Cyberspace: The Case of Italian E-Passports -- RLCPS Preface -- SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications -- A Secure and Privacy-Preserving Targeted Ad-System -- Cryptographic Cloud Storage -- Extending IPsec for Efficient Remote Attestation -- Open Mobile Alliance Secure Content Exchange: Introducing Key Management Constructs and Protocols for Compromise-Resilient Easing of DRM Restrictions -- How to Evaluate the Security of Real-Life Cryptographic Protocols? -- WECSR Preface -- Preaching What We Practice: Teaching Ethical Decision-Making to Computer Security Professionals -- A Case Study on Measuring Statistical Data in the Tor Anonymity Network -- A Case Study in Ethical Decision Making Regarding Remote Mitigation of Botnets -- Ethical Proactive Threat Research -- A Framework for Understanding and Applying Ethical Principles in Network and Security Research -- Ethical Concerns in Computer Security and Privacy Research Involving Human Subjects -- Ethical Guidelines for Computer Security Researchers: “Be Reasonable”.This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.Security and Cryptology ;6054Computer communication systemsData encryption (Computer science)Computer engineeringE-commerceManagement information systemsComputer scienceComputers and civilizationComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I27000e-Commerce/e-businesshttps://scigraph.springernature.com/ontologies/product-market-codes/I26000Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Teneriffa <2010>swdConference proceedings.fastKongressswdComputer communication systems.Data encryption (Computer science).Computer engineering.E-commerce.Management information systems.Computer science.Computers and civilization.Computer Communication Networks.Cryptology.Computer Engineering.e-Commerce/e-business.Management of Computing and Information Systems.Computers and Society.004.6Sion Raduedthttp://id.loc.gov/vocabulary/relators/edtCurtmola Rezaedthttp://id.loc.gov/vocabulary/relators/edtDietrich Svenedthttp://id.loc.gov/vocabulary/relators/edtKiayias Aggelosedthttp://id.loc.gov/vocabulary/relators/edtMiret Josep Medthttp://id.loc.gov/vocabulary/relators/edtSako Kazueedthttp://id.loc.gov/vocabulary/relators/edtSebé Francescedthttp://id.loc.gov/vocabulary/relators/edtFC (Conference)(14th :2010 :Tenerife, Canary Islands)Workshop on Real-Life Cryptographic Protocols and Standardization(2010 :Tenerife, Canary Islands)Workshop on Ethics in Computer Security Research(2010 :Tenerife, Canary Islands)Workshop on Lightweight Cryptography for Resource-Constrained Devices(2010 :Tenerife, Canary Islands)BOOK996466280603316Financial Cryptography and Data Security772196UNISA03623 am 22006613u 450 99631844930331620231110213009.03-11-054311-73-11-054308-710.1515/9783110543117(CKB)4100000009940228(OAPEN)1006920(DE-B1597)480881(OCoLC)1135591183(DE-B1597)9783110543087(MiAaPQ)EBC5447338(Au-PeEL)EBL5447338(OCoLC)1136960827(oapen)https://directory.doabooks.org/handle/20.500.12854/32290(EXLCZ)99410000000994022820200406h20192020 fg enguuuuu---auuuutxtrdacontentcrdamediacrrdacarrierDividing Texts Conventions of Visual Text-Organisation in Nepalese and North Indian Manuscripts /Bidur BhattaraiBerlin/BostonDe Gruyter2020Berlin ;Boston : De Gruyter, [2019]©20201 online resource (376) Studies in Manuscript Cultures ;103-11-054307-9 Frontmatter -- Contents -- Preface -- Acknowledgements -- 1. Introduction -- 2. Overall layout and possible reasons for its change in manuscript -- 3. Use of symbols -- 4. Use of space -- 5. Use of colour -- 6. Conclusions -- Appendices -- References -- List of figures -- Index of manuscriptsThe number of manuscripts produced in the Indian sub-continent is astounding and is the result of a massive enterprise that was carried out over a vast geographical area and over a vast stretch of time. Focusing mainly on areas of Northern India and Nepal between 800 to 1300 CE and on manuscripts containing Sanskrit texts, the present study investigates a fundamental and so far rarely studied aspect of manuscript production: visual organisation. Scribes adopted a variety of visual strategies to distinguish one text from another and to differentiate the various sections within a single text (chapters, sub-chapters, etc.). Their repertoire includes the use of space(s) on the folio, the adoption of different writing styles, the inclusion of symbols of various kind, the application of colours ('rubrication'), or a combination of all these. This study includes a description of these various strategies and an analysis of their different implementations across the selected geographical areas. It sheds light on how manuscripts were produced, as well as on some aspects of their employment in ritual contexts, in different areas of India and Nepal.Studies in Manuscript Cultures Regional studiesbicsscAustralasian & Pacific historybicsscNon-Western philosophybicsscPhilosophy: epistemology & theory of knowledgebicsscPhilosophy: aestheticsbicsscCult of the book.Sanskrit.South Asian book history.visual organisation.Regional studiesAustralasian & Pacific historyNon-Western philosophyPhilosophy: epistemology & theory of knowledgePhilosophy: aesthetics091.0954Bhattarai Bidur, authttp://id.loc.gov/vocabulary/relators/aut955190DE-B1597DE-B1597BOOK996318449303316Dividing Texts2160628UNISA