01048nam0-2200313---450-99000816244040332120050713120019.03110097036000816244FED01000816244(Aleph)000816244FED0100081624420050713d1984----km-y0itay50------bagerDEy---n----00yyHilarius von Poitiers und die Bischofsopposition gegen Konstantius 2Untersuchungen zur dritten Phase des Arianischen Streites, 337-361von Hanns Christof BrenneckeBerlin New YorkDe Gruyter1984XX, 400 p.24 cmPatristische Texte und Studien26270.219itaBrennecke,Hanns Christof070269345ITUNINARICAUNIMARCBK990008162440403321DDR-XX Dc XXX 032342 ddrDDR21-7379DDRHilarius von Poitiers und die Bischofsopposition gegen Konstantius 2736707UNINA04003nam 2200697Ia 450 991078424420332120230829000628.066105051871-280-50518-497866105051801-4237-9732-91-60750-155-4600-00-0549-01-60129-135-3(CKB)1000000000340195(EBL)265974(OCoLC)437171014(SSID)ssj0000243203(PQKBManifestationID)11210995(PQKBTitleCode)TC0000243203(PQKBWorkID)10322526(PQKB)11016545(MiAaPQ)EBC265974(Au-PeEL)EBL265974(CaPaEBR)ebr10130650(CaONFJC)MIL50518(OCoLC)71202776(EXLCZ)99100000000034019520060407d2006 uy 0engur|n|---|||||txtccrSecurity and embedded systems[electronic resource] /edited by Dimitrios N. Serpanos and Ran GiladiAmsterdam ;Washington, D.C. IOS Pressc20061 online resource (216 p.)NATO security through science series. D, Information and communication security ;vol. 2Proceedings from the NATO Advanced Research Workshop on "Security and Embedded Systems."1-58603-580-0 Includes bibliographical references and author index.Title page; Preface; Contents; Chaotic Routing as a Method of an Information Conversion; Combinatorial Game Models for Security Systems; Architectural Enhancements for Secure Embedded Processing; Computational Improvements to Differential Side Channel Analysis; A Process Algebra Approach to Authentication and Secrecy; Intellectual Property Protection Using Embedded Systems; Challenges in Deeply Networked System Survivability; Multimedia Watermarking; A Platform for Designing Secure Embedded Systems; Cryptographic Insecurity of the Test & Repeat ParadigmA Privacy Classification Model Based on Linkability ValuationA Run-Time Reconfigurable Architecture for Embedded Program Flow Verification; Model-Based Validation of Enterprise Access Policies; Research Issues in Homeland Security; Assurance in Autonomous Decentralized Embedded System; Vulnerabilities and Countermeasures for Embedded Processors; Agent-Based Modeling and Simulation of Malefactors' Attacks Against Computer Networks; Current Problems in Security of Military Networks; Multi-Agent Framework for Intrusion Detection and Alert CorrelationSecuring Home and Building Automation Systems Using the zPnP ApproachREWARD: A Routing Method for Ad-Hoc Networks with Adjustable Security Capability; On the Security of the GSM Cellular Network; Telecommunications Fraud & Electronic Crime in Fix and Mobile Embedded Systems; Author IndexFocuses on the deployment and use of embedded systems in a range of applications. Considering the main directions of research in the field, three main areas are discussed: foundations of security and embedded systems; secure embedded computing systems; and telecommunications and network services.NATO security through science series.D,Information and communication security ;v. 2.Embedded computer systemsSecurity measuresCongressesComputer securityCongressesEmbedded computer systemsSecurity measuresComputer security005.8Giladi Ran1562286Serpanos Dimitrios Nikolaou1562287NATO Advanced Research Workshop on Security and Embedded Systems(2005 :Patra, Greece)MiAaPQMiAaPQMiAaPQBOOK9910784244203321Security and embedded systems3829819UNINA