00870nam0 2200289 450 00003001420140506124136.0978-88-238-2137-820140506d2011----km-y0itay50------baitaITy-------001yyEconomia della bancaa cura di Roberto RuoziRoberto Bottiglia...[et al]MilanoEgeac2011XVII, 438 p.24 cm<<I >>manuali592001<<I >>manualiBancheEconomiaBancheGestione332.106822Banche e servizi bancari. GestioneRuozi,RobertoBottiglia,RobertoITUNIPARTHENOPE20140605RICAUNIMARC000030014332-E/5645075NAVA12014Economia della banca242427UNIPARTHENOPE01075nam0 22002651i 450 UON0050032320231205105411.62420191113d1956 |0itac50 baengUS|||| 1||||ˆThe ‰last of the Mohicansa narrative of 1757by James Fenimore Cooperillustrated by N. C. WyethNew YorkCharles Scribner's Sons1956vi, 370 p.[14] c. di tav.24 cmUSNew YorkUONL000050813.2Narrativa americana in inglese, 1776-182921COOPERJames FenimoreUONV126219116741WYETHNewell ConversUONV239455Charles *Scribner's SonsUONV283725650ITSOL20240220RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00500323SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI NordA IV A 025 SI MR 47925 7 025 Last of the mohicans71567UNIOR03870nam 22007935 450 991048423100332120251225205455.03-319-72089-910.1007/978-3-319-72089-0(CKB)4340000000223592(DE-He213)978-3-319-72089-0(MiAaPQ)EBC6287312(MiAaPQ)EBC5590761(Au-PeEL)EBL5590761(OCoLC)1013931518(PPN)221251855(EXLCZ)99434000000022359220171122d2017 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierInformation Theoretic Security 10th International Conference, ICITS 2017, Hong Kong, China, November 29 – December 2, 2017, Proceedings /edited by Junji Shikata1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XII, 235 p. 31 illus.) Security and Cryptology,2946-1863 ;106813-319-72088-0 Quantum cryptography -- Quantum information theory -- Post-quantum cryptography (e.g. lattices and cryptography) -- Physical layer security -- Wiretap channels -- Adversarial channel models -- Cryptography from noisy channels -- Bounded storage models -- Network coding security -- Biometric security -- Randomness extraction -- Key and message rates -- Secret sharing -- Authentication codes -- Multiparty computations -- Information theoretic reductions -- Implementation challenges.This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.Security and Cryptology,2946-1863 ;10681Data protectionCoding theoryInformation theoryComputer networksSoftware engineeringComputer scienceMathematicsMathematical statisticsComputer visionData and Information SecurityCoding and Information TheoryComputer Communication NetworksSoftware EngineeringProbability and Statistics in Computer ScienceComputer VisionData protection.Coding theory.Information theory.Computer networks.Software engineering.Computer scienceMathematics.Mathematical statistics.Computer vision.Data and Information Security.Coding and Information Theory.Computer Communication Networks.Software Engineering.Probability and Statistics in Computer Science.Computer Vision.005.8Shikata Junjiedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910484231003321Information Theoretic Security773803UNINA