01475nam0 2200325 i 450 SUN001217220090727120000.088-17-11617-3IT95 225420030203d1994 |0itac50 baitaLATGRCIT|||| |||||ˆLa ‰corruzione politica nell'antica RomaLuciano Perelli[Milano]Rizzoli1994321 p.20 cm.001SUN00122062001 Supersaggi117210 MilanoBiblioteca universale Rizzoli.Corruzione politicaRoma anticaFISUNC006517MilanoSUNL000284364.1323093721Perelli, LucianoSUNV009053185782RizzoliSUNV000281650ITSOL20181109RICASUN0012172UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA00 CONS XVIII.Em.15 00 9508 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI LETTERE E BENI CULTURALI07 CONS Fa 1650 07 2234 UFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI GIURISPRUDENZA9508CONS XVIII.Em.15paUFFICIO DI BIBLIOTECA DEL DIPARTIMENTO DI LETTERE E BENI CULTURALIIT-CE01032234CONS Fa 1650caCorruzione politica nell'antica Roma855172UNICAMPANIA06998nam 22008295 450 991030025010332120200701104722.03-319-18275-710.1007/978-3-319-18275-9(CKB)3710000000476914(EBL)4089841(SSID)ssj0001584963(PQKBManifestationID)16265245(PQKBTitleCode)TC0001584963(PQKBWorkID)14865285(PQKB)10237775(DE-He213)978-3-319-18275-9(MiAaPQ)EBC4089841(PPN)190516410(EXLCZ)99371000000047691420150915d2015 u| 0engur|n|---|||||txtccrComputation, Cryptography, and Network Security /edited by Nicholas J. Daras, Michael Th. Rassias1st ed. 2015.Cham :Springer International Publishing :Imprint: Springer,2015.1 online resource (754 p.)Description based upon print version of record.3-319-18274-9 Includes bibliographical references at the end of each chapters.Transformations of Cryptographic Schemes Through Interpolation Techniques (S.-A.N. Alexandropoulos, G.C. Meletiou, D.S. Triantafyllou, M.N. Vrahatis) -- Flaws in the Initialization Process of Stream Ciphers (A. Alhamdan, H. Bartlett, E. Dawson, L. Simpson, K. Koon-Ho Wong) -- Producing Fuzzy Includion and Entropy Measures (A.C. Bogiatzis, B.K. Papadopoulos) -- On Some Recent Results on Asymptotic Behavior of Orthogonal Polynomials on the Unit Circle and Inserting Point Masses (K. Castillo, F. Marcellán) -- On the Unstable Equilibrium Points and System Separations in Electric Power Systems: a Numerical Study (J. Cui, H.-D. Chiang, T. Wang) -- Security and Formation of Network-Centric Operations (N.J. Daras) -- A Bio-Inspired Hybrid Artificial Intelligence Framework for Cyber Security (K. Demertzis, L. Iliadis) -- Integral Estimates for the Composition of Green's and Bounded Operators (S. Ding, Y. Xing) -- A Survey of Reverse Inequalities for f-Divergence Measure in Information Theory (S.S. Dragomir) -- On Geometry of the Zeros of a Polynomial (N.K. Govil, E.R. Nwaeze) -- Approximation by Durrmeyer Type Operators Preserving Linear Functions (V. Gupta) -- Revisiting the Complex Multiplication Method for the Construction of Elliptic Curves (E. Konstantinou, A. Kontogeorgis) -- Generalized Laplace Transform Inequalities in Multiple Weighted Orlicz Spaces (J. Kuang) -- Threshold Secret Sharing Through Multivariate Birkhoff Interpolation (V.E. Markoutis, G.C. Meletiou, A.N. Veneti, M.N. Vrahatis) -- Advanced Truncated Differential Attacks Against GOST Block Cipher and its Variants (T. Mourouzis, N. Courtois) -- A Supply Chain Game Theory Framework for Cybersecurity Investments Under Network Vulnerability (A. Nagurney, L.S. Nagurney, S. Shukla) -- A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies (P.E. Nastou, D. Nastouli, P.M. Pardalos, Y.C Stamatiou) -- Quantam Analogues of Hermite–Hadamard Type Inequalities forN Which is Implemented in MuPAD and Whose Computability is an Open Problem (A. Tyszka) -- Image Encryption Scheme Based on Non-Autonomous Chaotic Systems (C.K. Volos, I.M. Kyprianidis, I. Stouboulos, V.-T. Pham) -- Multiple Parameterized Yang–Hilbert-Type Integral Inequalities (B. Yang) -- Parameterized Yang–Hilbert-Type Integral Inequalities and their Operator Expressions (B. Yang, M.Th. Rassias) -- A Secure Communication Design Based on the Chaotic Logistic Map: an Experimental Realization Using Arduino Microcontrollers (M. Zapateiro De la Hoz, L. Acho, Y. Vidal).Analysis, assessment, and data management are core competencies for operation research analysts. This volume addresses a number of issues and developed methods for improving those skills. It is an outgrowth of a conference held in April 2013 at the Hellenic Military Academy, and brings together a broad variety of mathematical methods and theories with several applications. It discusses directions and pursuits of scientists that pertain to engineering sciences. It is also presents the theoretical background required for algorithms and techniques applied to a large variety of concrete problems. A number of open questions as well as new future areas are also highlighted.   This book will appeal to operations research analysts, engineers, community decision makers, academics, the military community, practitioners sharing the current “state-of-the-art,” and analysts from coalition partners. Topics covered include Operations Research, Games and Control Theory, Computational Number Theory and Information Security, Scientific Computing and Applications, Statistical Modeling and Applications, Systems of Monitoring and Spatial Analysis.  .AlgebraOrdered algebraic structuresNumber theoryCoding theoryInformation theoryApproximation theoryComputer organizationOperations researchManagement scienceOrder, Lattices, Ordered Algebraic Structureshttps://scigraph.springernature.com/ontologies/product-market-codes/M11124Number Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/M25001Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Approximations and Expansionshttps://scigraph.springernature.com/ontologies/product-market-codes/M12023Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Operations Research, Management Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/M26024Algebra.Ordered algebraic structures.Number theory.Coding theory.Information theory.Approximation theory.Computer organization.Operations research.Management science.Order, Lattices, Ordered Algebraic Structures.Number Theory.Coding and Information Theory.Approximations and Expansions.Computer Systems Organization and Communication Networks.Operations Research, Management Science.510Daras Nicholas Jedthttp://id.loc.gov/vocabulary/relators/edtRassias Michael Thedthttp://id.loc.gov/vocabulary/relators/edtBOOK9910300250103321Computation, cryptography, and network security1522654UNINA