01393nam 2200349 n 450 99639200730331620221108062744.0(CKB)1000000000673279(EEBO)2240955028(UnM)99870192(EXLCZ)99100000000067327919940819d1642 uh |engurbn||||a|bb|Decemb. 3. 1642. At the committee of Lords and Commons, for advance of money and other necessaries for the army[electronic resource] It is this day ordered that whereas an accompt hath beene given unto us, by the sub-committee of London, ..[London s.n.1642]1 sheet ([1] p.)Title includes opening words of text.Imprint from Wing.Annotation on Thomason copy: "Church-wardens & constables [illegible] parish London. Paid to Taylor Geo. Thomason, Luke Fawne, Martin Dallison Clerk of ye said committee.Reproduction of the original in the British Library.eebo-0018Great BritainMilitiaEarly works to 1800Great BritainHistoryCivil War, 1642-1649FinanceEarly works to 1800Cu-RivESCu-RivESCStRLINWaOLNBOOK996392007303316Decemb 3. 16422308922UNISA03505nam 22007215 450 991042769460332120251225185135.0981-334-706-610.1007/978-981-33-4706-9(OCoLC)1238200339(CKB)5280000000246084(MiAaPQ)EBC6417072(DE-He213)978-981-33-4706-9(PPN)252504240(EXLCZ)99528000000024608420201130d2020 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierApplications and Techniques in Information Security 11th International Conference, ATIS 2020, Brisbane, QLD, Australia, November 12–13, 2020, Proceedings /edited by Lejla Batina, Gang Li1st ed. 2020.Singapore :Springer Nature Singapore :Imprint: Springer,2020.1 online resource (IX, 123 p. 33 illus., 21 illus. in color.)Communications in Computer and Information Science,1865-0937 ;1338Includes index.981-334-705-8 A Framework for Evaluation of Software Obfuscation Tools for Embedded Devices -- Forward Secure Conjunctive-Keyword Searchable Symmetric Encryption Using Shamir Threshold Secret Sharing Scheme -- Digital Forensics for Drones: A Study of Tools and Techniques -- Distinguishing Attacks on Linearly Filtered NFSRs with Decimated Output -- A New Rabin-type Cryptosystem with Modulus P^2q -- Malware Analysis Method Based Random Access Memory in Android -- Vulnerability Database as a Service for IoT -- Linear and Partly-Pseudo-Linear Cryptanalysis of Reduced-Round SPARX Cipher. .This book constitutes the refereed proceedings of the 11th International Conference on Applications and Techniques in Information Security, ATIS 2020, held in Brisbane, QLD, Australia, in November 2020. Due to the COVID-19 pandemic the conference was be held online. The 8 full papers presented in the volume were carefully reviewed and selected from 24 submissions. The papers are focused on all aspects on techniques and applications in information security research. .Communications in Computer and Information Science,1865-0937 ;1338Data protectionComputer engineeringComputer networksCryptographyData encryption (Computer science)Computer networksSecurity measuresData and Information SecurityComputer Engineering and NetworksCryptologyMobile and Network SecurityComputer Communication NetworksData protection.Computer engineering.Computer networks.Cryptography.Data encryption (Computer science).Computer networksSecurity measures.Data and Information Security.Computer Engineering and Networks.Cryptology.Mobile and Network Security.Computer Communication Networks.929.605Li GangBatina LejlaMiAaPQMiAaPQMiAaPQBOOK9910427694603321Applications and Techniques in Information Security2028776UNINA