01269cam0 22003011 450 SOBE0001934720250312143406.0270180197420111104d2006 |||||ita|0103 baitaFR<<La >>compravendita di beni immobili in età antico-babiloneseSimonetti CristinaParisdiffusion De Boccard2006229 p.30 cmStudi egei e vicinorientali2001LAEC000286622001 *Studi egei e vicinorientali2Simonetti, CristinaSOBA00001523070774648ITUNISOB20250312RICAUNISOBUNISOBFondo|De|Sanctis|F154901UNISOB340165732SOBE00019347M 102 Monografia moderna SBNMFondo|De|Sanctis|FCXCVII (197)CON154901DeSanctisFdonoNmenleUNISOBUNISOB20111104110343.020250312143406.0bethbPer le modalità di consultazione vedi homepage della Biblioteca link Fondi340007851SI16573220150512donocatenacciUNISOBUNISOB20150622103848.020150622104030.0catenacciCompravendita di beni immobili in età antico-babilonese1720000UNISOB04984nam 22006735 450 991098339090332120250111115247.09783030715229303071522110.1007/978-3-030-71522-9(MiAaPQ)EBC31876505(Au-PeEL)EBL31876505(CKB)37194968600041(DE-He213)978-3-030-71522-9(OCoLC)1492964106(EXLCZ)993719496860004120250111d2025 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierEncyclopedia of Cryptography, Security and Privacy /edited by Sushil Jajodia, Pierangela Samarati, Moti Yung3rd ed. 2025.Cham :Springer Nature Switzerland :Imprint: Springer,2025.1 online resource (0 pages)Computer Science Series9783030715205 3030715205 Security Policies and Access Control -- Public key encryption, digital signatures -- Number theory, primality tests, discrete log, factorisation -- Public-key cryptography, hardware, physical attacks -- Implementation aspects of cryptographic algorithms -- Hardware attacks -- Multi-party computation, voting schemes, digital signature schemes -- Web security -- DBMS and Application Security -- Biometrics -- Software Security -- Network Security -- Formal Methods and Assurance -- Sensor and Ad Hoc Networks -- DOS -- Privacy-preserving data mining -- Private information retrieval -- Privacy metrics and data protection -- Wireless Security -- Broadcast channel, secret sharing, threshold schemes, subliminal channels -- Risk management and organizational security and privacy -- Usable/user-centric privacy -- Less-constrained biometrics -- Access and Query Privacy -- Cryptocurrencies -- Encryption-Based Access Control Based on Public Key Cryptography -- Cyber-physical systems and infrastructure: security andprivacy -- Location privacy and privacy in locations-based applications -- Privacy in emerging scenarios -- Privacy and security in social networks -- Economics of security and privacy -- Key management -- Elliptic curve cryptography -- Sequences, Boolean functions, stream ciphers -- Secure multiparty computations -- Human Aspects in Security and Privacy -- Trustworthy Computing, Physical/Hardware Security -- AI approaches for security and privacy -- Privacy and anonymity in communication networks -- Privacy laws and directives.A rich stream of papers and many good books have been written on cryptography, security, and privacy, but most of them assume a scholarly reader who has the time to start at the beginning and work his way through the entire text. The goal of Encyclopedia of Cryptography, Security, and Privacy, Third Edition is to make important notions of cryptography, security, and privacy accessible to readers who have an interest in a particular concept related to these areas, but who lack the time to study one of the many books in these areas. The third edition is intended as a replacement of Encyclopedia of Cryptography and Security, Second Edition that was edited by Henk van Tilborg and Sushil Jajodia and published by Springer in 2011. The goal of the third edition is to enhance on the earlier edition in several important and interesting ways. First, entries in the second edition have been updated when needed to keep pace with the advancement of state of the art. Second, as noticeable already from the title of the encyclopedia, coverage has been expanded with special emphasis to the area of privacy. Third, considering the fast pace at which information and communication technology is evolving and has evolved drastically since the last edition, entries have been expanded to provide comprehensive view and include coverage of several newer topics. .Computer Science SeriesData structures (Computer science)Information theoryCryptographyData encryption (Computer science)Coding theoryData Structures and Information TheoryCryptologyCoding and Information TheoryData structures (Computer science)Information theory.Cryptography.Data encryption (Computer science)Coding theory.Data Structures and Information Theory.Cryptology.Coding and Information Theory.652.803Jajodia Sushil28486Samarati Pierangela1430844Yung Moti1071902MiAaPQMiAaPQMiAaPQBOOK9910983390903321Encyclopedia of Cryptography, Security and Privacy4317040UNINA