00929nam0 2200265 450 00002533920090415141751.097888-386-6452-620090415d2008----km-y0itay50------baitaITy-------001yyMarket-driven managementmarketing strategico e operativoJean-Jacques Lambincon la collaborazione di Emanuela Tesser5. ed.MilanoMcGraw-Hill2008XXVI, 597 p.26 cmMarket-driven management: Strategic and Operational Marketing<in italiano>41420MarketingPianificazione658.80221Lambin,Jean Jacques79664ITUNIPARTHENOPE20090415RICAUNIMARC000025339W-011041364NAVA32009Market-driven management. Strategic and operational marketing41420UNIPARTHENOPE03885nam 22006735 450 991034941540332120251225203718.09783319968780331996878510.1007/978-3-319-96878-0(CKB)4100000005679043(DE-He213)978-3-319-96878-0(MiAaPQ)EBC6284361(PPN)229915930(MiAaPQ)EBC6275241(EXLCZ)99410000000567904320180723d2018 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierAdvances in Cryptology – CRYPTO 2018 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19–23, 2018, Proceedings, Part III /edited by Hovav Shacham, Alexandra Boldyreva1st ed. 2018.Cham :Springer International Publishing :Imprint: Springer,2018.1 online resource (XV, 787 p. 93 illus.) Security and Cryptology,2946-1863 ;10993Includes index.9783319968773 3319968777 Secure messaging -- Implementations and physical attacks prevention -- Authenticated and format-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing -- Encryption -- Symmetric cryptography -- Proofs of work and proofs of Stake -- Proof tools -- Key exchange -- Symmetric cryptoanalysis -- Hashes and random oracles -- Trapdoor functions -- Round optimal MPC -- Foundations -- Lattices -- Lattice-based ZK -- Efficient MPC -- Quantum cryptography -- MPC -- Garbling -- Information-theoretic MPC -- Oblivious transfer -- Non-malleable codes -- Zero knowledge -- Obfuscation.The three volume-set, LNCS 10991, LNCS 10992, and LNCS 10993, constitutes the refereed proceedings of the 38th Annual International Cryptology Conference, CRYPTO 2018, held in Santa Barbara, CA, USA, in August 2018. The 79 revised full papers presented were carefully reviewed and selected from 351 submissions. The papers are organized in the following topical sections: secure messaging; implementations and physical attacks prevention; authenticated and format-preserving encryption; cryptoanalysis; searchable encryption and differential privacy; secret sharing; encryption; symmetric cryptography; proofs of work and proofs of stake; proof tools; key exchange; symmetric cryptoanalysis; hashes and random oracles; trapdoor functions; round optimal MPC; foundations; lattices; lattice-based ZK; efficient MPC; quantum cryptography; MPC; garbling; information-theoretic MPC; oblivious transfer; non-malleable codes; zero knowledge; and obfuscation.Security and Cryptology,2946-1863 ;10993CryptographyData encryption (Computer science)Software engineeringComputer scienceMathematicsMathematical statisticsCryptologySoftware EngineeringProbability and Statistics in Computer ScienceCryptography.Data encryption (Computer science).Software engineering.Computer scienceMathematics.Mathematical statistics.Cryptology.Software Engineering.Probability and Statistics in Computer Science.005.82Shacham Hovavedthttp://id.loc.gov/vocabulary/relators/edtBoldyreva Alexandraedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910349415403321Advances in Cryptology – CRYPTO 20181912516UNINA