00819nam0-2200313---450-99001010950040332120161011094920.0978-1-3088-3957-8001010950FED01001010950(Aleph)001010950FED0100101095020161011d2016----km-y0itay50------baeng--------001yyIntroduction to businessMarina Candi, Elisa RaoliS.L.McGraw-Hill Education2016479 p.26 cmCreate3957-8331Candi,MarinaRaoli,ElisaITUNINARICAUNIMARCBK990010109500403321ECMAC89A1014DECBCECMAC89B1015DECBCDECBCUNINA02275nam 2200589 a 450 991096783590332120240516165900.0979-82-16-21068-91-280-67980-897866136567350-7391-7210-7(CKB)2670000000203751(EBL)928518(OCoLC)854519948(SSID)ssj0000657467(PQKBManifestationID)12280055(PQKBTitleCode)TC0000657467(PQKBWorkID)10680508(PQKB)11588112(Au-PeEL)EBL928518(CaPaEBR)ebr10568818(CaONFJC)MIL365673(MiAaPQ)EBC928518(EXLCZ)99267000000020375120111109d2012 uy 0engurcn|||||||||txtccrMohammad Reza Shajarian's avaz in Iran and beyond, 1979-2010 /Rob Simms and Amir Koushkani1st ed.Lanham Lexington Booksc20121 online resource (252 p.)Description based upon print version of record.0-7391-7209-3 Includes bibliographical references and index.Revolution, war, and music -- Landmark recordings -- Around the world -- Presently.Mohammad Reza Shajarian's Avaz in Iran and Beyond, 1979-2010 is a comprehensive study of the legacy of Mohammad Reza Shajarian, the greatest living exponent of avaz, the traditional art of singing classical Persian poetry. Focusing on Shajarian's career after the Islamic Revolution of 1979, the study includes a detailed examination of the landmark recordings that established him as a national and then global icon of refined Persian culture, artistic excellence, and courageous political resistance.SingersIranBiographySingers782.42169092BSimms Rob1962-776575Koushkani Amir1968-1820482MiAaPQMiAaPQMiAaPQBOOK9910967835903321Mohammad Reza Shajarian's avaz in Iran and beyond, 1979-20104382718UNINA05032nam 22007455 450 99666847250331620250712074738.0981-9690-95-110.1007/978-981-96-9095-4(MiAaPQ)EBC32201095(Au-PeEL)EBL32201095(CKB)39615170000041(DE-He213)978-981-96-9095-4(EXLCZ)993961517000004120250708d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierInformation Security and Privacy 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14–16, 2025, Proceedings, Part I /edited by Willy Susilo, Josef Pieprzyk1st ed. 2025.Singapore :Springer Nature Singapore :Imprint: Springer,2025.1 online resource (723 pages)Lecture Notes in Computer Science,1611-3349 ;15658981-9690-94-3 -- Symmetric-Key Cryptography and Cryptanalysis. -- Forgery Attacks on SipHash. -- Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initial ization Vulnerabilities. -- Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks. -- Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and Chaghri. -- Improved Differential Meet-In-The-Middle Cryptanalysis on SIMON and Piccolo. -- Strengthening Key Scheduling of AES-256 with Minimal Software Modifications. -- Public-Key Encryption. -- Ideal Transformations for Public Key Encryption. -- Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs Implicit Rejection. -- Digital Signatures and Zero Knowledge. -- Compressed Sigma Protocols: New Model and Aggregation Techniques. -- Glitter: A Fully Adaptive and Tightly Secure Threshold Signature. -- Faster VOLEitH Signatures from All-but-One Vector Commitment and Half Tree. -- Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption. -- Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit. -- Cryptographic Protocols and Blockchain. -- FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity. -- TEAKEX: TESLA-Authenticated Group Key Exchange. -- SoK: A Deep Dive into Anti-Money Laundering Techniques for Blockchain Cryptocurrencies. -- Advanced Temporal Graph Embedding For Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks. -- Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols. -- PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain.This three-volume set in LNCS constitutes the refereed proceedings of the 30th Australasian Conference on Information Security and Privacy, ACISP 2025, held in Wollongong, NSW, Australia, during July 14–16, 2025. The 54 full papers, 6 short papers and 1 invited paper included in this book were carefully reviewed and selected from 181 submissions. They were organized in topical sections as follows: symmetric-key cryptography and cryptanalysis; public-key encryption; digital signatures and zero knowledge; cryptographic protocols and blockchain; post-quantum cryptography; homomorphic encryption and applications; cryptographic foundations and number theory; privacy enhancing technologies; AI security and privacy; system security.Lecture Notes in Computer Science,1611-3349 ;15658Data protectionComputer securityCryptographyData encryption (Computer science)Data protectionLaw and legislationComputer networksSecurity measuresBlockchains (Databases)Data and Information SecurityPrinciples and Models of SecurityCryptologyPrivacyMobile and Network SecurityBlockchainData protection.Computer security.Cryptography.Data encryption (Computer science)Data protectionLaw and legislation.Computer networksSecurity measures.Blockchains (Databases)Data and Information Security.Principles and Models of Security.Cryptology.Privacy.Mobile and Network Security.Blockchain.005.8Susilo Willy1759814Pieprzyk Josef486892MiAaPQMiAaPQMiAaPQBOOK996668472503316Information Security and Privacy4406540UNISA