01326nam--2200421---450-99000209421020331620091204114201.0000209421USA01000209421(ALEPH)000209421USA0100020942120041020d1976----km-y0itay0103----baitaITa|||||||001yyLavoro salariato e nocivitàinfortuni e malattie del lavoro nello sviluppo economico del lavoro nello sviluppo economico italianoLuigi CampiglioBariDe Donato1976337 p.ill.21 cmMovimento operaio332001Movimento operaio332001001-------2001CAMPIGLIO,Luigi44106ITsalbcISBD990002094210203316XXX.B. Coll. 48/ 29 (Coll. AQ 33)38796 G.XXX.B. Coll. 48/ (Coll. AQ)00211628600 613.62 CAM633 DISESBKGIUDISESSIAV31020041020USA010954RSIAV19020091204USA01114220121027USA01155120121027USA01160220121027USA011611Lavoro salariato e nocivita688134UNISAUSA1446303281nam 22007215 450 991055688770332120251225212243.03-030-99277-210.1007/978-3-030-99277-4(MiAaPQ)EBC6940154(Au-PeEL)EBL6940154(CKB)21428048800041(PPN)261518259(BIP)83667766(BIP)83379969(DE-He213)978-3-030-99277-4(EXLCZ)992142804880004120220326d2022 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierSelected Areas in Cryptography 28th International Conference, Virtual Event, September 29 – October 1, 2021, Revised Selected Papers /edited by Riham AlTawy, Andreas Hülsing1st ed. 2022.Cham :Springer International Publishing :Imprint: Springer,2022.1 online resource (512 pages)Lecture Notes in Computer Science,1611-3349 ;13203Print version: AlTawy, Riham Selected Areas in Cryptography Cham : Springer International Publishing AG,c2022 9783030992767 Includes bibliographical references and index.This book contains revised selected papers from the 28th International Conference on Selected Areas in Cryptography, SAC 2021, held as a virtual event September and October 2021.* The 23 full papers presented in this volume were carefully reviewed and selected from 60 submissions. They cover the following research areas: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash functions, MAC algorithms, and authenticated encryption schemes, efficient implementations of symmetric and public key algorithms, mathematical and algorithmic aspects of applied cryptology, and secure elections and related cryptographic constructions. *The conference was originally planned to take place at the University of Victoria, BC, Canada. Due to the COVID-19 pandemic, it was held virtually.Lecture Notes in Computer Science,1611-3349 ;13203Data protectionComputer networksComputer engineeringCryptographyData encryption (Computer science)Data and Information SecurityComputer Communication NetworksComputer Engineering and NetworksCryptologySecurity ServicesData protection.Computer networks.Computer engineering.Cryptography.Data encryption (Computer science)Data and Information Security.Computer Communication Networks.Computer Engineering and Networks.Cryptology.Security Services.005.8005.824AlTawy RihamHülsing AndreasMiAaPQMiAaPQMiAaPQBOOK9910556887703321Selected Areas in Cryptography2814504UNINA