01222nam a2200277 i 450099100028668970753620020506124655.0000505s1954 be ||| | lat b10679601-39ule_instEXGIL142942ExLBiblioteca Interfacoltàita871.01Calpurnius Siculus, Titus204267T. Calpurnii Siculi De Laude Pisonis et Bucolica, et M. Annaeis Lucani, De Laude Caesaris :einsidlensia quae dicuntur carmina /edition, traduction et commentaire par Raoul VerdièreBerchem ; Bruxelles :Latomus, Revue d'études latines,1954301 p. ;24 cmCollection Latomus ;19Calpurnio Siculo, TitoOpereLucano, Marco Anneo. De laude CaesarisLucanus, Marcus Annaeus.b1067960123-02-1728-06-02991000286689707536LE002 LAT II N 3512002000730169le002-E0.00-l- 00000.i1077297228-06-02T. Calpurnii Siculi De Laude Pisonis et Bucolica, et M. Annaeis Lucani, De Laude Caesaris910536UNISALENTOle00201-01-00ma -latbe 0101235nam0 22002891i 450 UON0006988720231205102346.60920020107d1984 |0itac50 baengUS||||m |||||Households, peasants and rural history in Lasta, northern Ethiopia 1900-35by James Craig McCannAnn Arbor : Michigan State Universityc1984xi311 p. ; 21 cmTesi di laureaMichigan State University, 1984ETIOPIAStoria economicaTesi di laureaUONC018381FIUSAnn Arbor (Michigan)UONL000025330.963ECONOMIA DELL'ETIOPIA21McCANNJames CraigUONV043919657828UMIUONV245796650McCANN, JamesMcCANN, James CraigUONV043920ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00069887SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI ET XII A a 007 SI AA 10357 7 007 Households, peasants and rural history in Lasta, northern Ethiopia 1900-351160933UNIOR04331nam 22006735 450 991050845470332120251113201356.03-030-90402-410.1007/978-3-030-90402-9(CKB)5600000000080728(MiAaPQ)EBC6797278(Au-PeEL)EBL6797278(PPN)258838558(OCoLC)1284914862(DE-He213)978-3-030-90402-9(EXLCZ)99560000000008072820211027d2021 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierProvable and Practical Security 15th International Conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021, Proceedings /edited by Qiong Huang, Yu Yu1st ed. 2021.Cham :Springer International Publishing :Imprint: Springer,2021.1 online resource (397 pages)Security and Cryptology,2946-1863 ;130593-030-90401-6 Searchable Encryption -- Public Key Based Searchable Encryption with Fine-Grained Sender Permission Control -- Improved Security Model for Public-key Authenticated Encryption with Keyword Search -- Public Key Encryption with Fuzzy Matching -- Partitioned Searchable Encryption -- Key Exchange & Zero Knowledge Proof -- Key Exposure Resistant Group Key Agreement Protocol -- NIKE from Affine Determinant Programs -- OrBit: OR-Proof Identity-Based Identification with Tight Security for (as low as) 1-bit Loss -- Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model -- Post Quantum Cryptography -- Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABERA Lattice Reduction Algorithm Based on Sublattice BKZ -- On the (M)iNTRU assumption in the integer case -- Functional Encryption -- Verifiable Functional Encryption using Intel SGX -- Fully Secure Unbounded Zero Inner Product Encryption with Short Ciphertexts and Keys -- Inner-Product Functional Encryption from Random Linear Codes: Trial and Challenges -- Digital Signature -- A CCA-full-anonymous Group Signature with Verifiable Controllable Linkability in the Standard Model -- Cryptanalysis of LRainbow: The Lifted Rainbow Signature Scheme -- Identification Scheme and Forward-Secure Signature in Identity-Based Setting from Isogenies -- Linearly Homomorphic Signatures with Designated Combiner -- Efficient Attribute-Based Signature for monotone predicates -- Practical Security Protocols -- Spatial Steganalysis Based on Gradient-Based Neural Architecture Search -- Turn-Based Communication Channels -- .This book constitutes the refereed proceedings of the 15th International Conference on Provable Security, ProvSec 2021, held in Guangzhou, China, in November 2021. The 21 full papers presented were carefully reviewed and selected from 67 submissions. The papers focus on provable security as an essential tool for analyzing security of modern cryptographic primitives. They are divided in the following topical sections: Searchable Encryption, Key Exchange & Zero Knowledge Proof, Post Quantum Cryptography, Functional Encryption, Digital Signature, and Practical Security Protocols.Security and Cryptology,2946-1863 ;13059CryptographyData encryption (Computer science)Computer engineeringComputer networksData protectionCryptologyComputer Engineering and NetworksComputer Engineering and NetworksData and Information SecurityCryptography.Data encryption (Computer science).Computer engineering.Computer networks.Data protection.Cryptology.Computer Engineering and Networks.Computer Engineering and Networks.Data and Information Security.005.8Huang QiongYu YuMiAaPQMiAaPQMiAaPQBOOK9910508454703321Provable and practical security2113467UNINA