01113nam--2200373---450-99000611978020331620160203094823.02-84050-171-6000611978USA01000611978(ALEPH)000611978USA0100061197820160203d2000----km-y0itay50------bafreFR||||||||001yy[La] création lexicale en latinactes de la table ronde du 9. Colloque international de linguistique latine, Madrid 16 avril 1997textes réunis par Michèle Fruyt et Christian NicolasParisUniversité de Paris-Sorbonne2000181 p.24 cm20012001001-------2001Lingua latinaBNCF470FRUYT,MichèleNICOLAS,ChristianITsalbcISBD990006119780203316SG 1396434 DSABKDSADSA9020160203USA010948Création lexicale en latin1384611UNISA06079nam 22008655 450 99646531380331620200704024206.03-642-04766-110.1007/978-3-642-04766-4(CKB)1000000000784730(SSID)ssj0000318194(PQKBManifestationID)11205753(PQKBTitleCode)TC0000318194(PQKBWorkID)10307955(PQKB)10373222(DE-He213)978-3-642-04766-4(MiAaPQ)EBC3064632(PPN)139958975(EXLCZ)99100000000078473020100301d2009 u| 0engurnn|008mamaatxtccrIdentity and Privacy in the Internet Age[electronic resource] 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009, Proceedings /edited by Audun Jøsang, Torleiv Maseng, Svein J. Knapskog1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (X, 303 p.) Security and Cryptology ;5838Bibliographic Level Mode of Issuance: Monograph3-642-04765-3 Includes bibliographical references and index.Session 1: Anonymity and Privacy -- On the Effectiveness of Privacy Breach Disclosure Legislation in Europe: Empirical Evidence from the US Stock Market -- Facilitating the Adoption of Tor by Focusing on a Promising Target Group -- A Parallelism-Based Approach to Network Anonymization -- Security Usability of Petname Systems -- Session 2: Modelling and Design -- An Analysis of Widget Security -- Trade-Offs in Cryptographic Implementations of Temporal Access Control -- Blunting Differential Attacks on PIN Processing APIs -- Session 3: Network Layer Security -- Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic -- An Improved Attack on TKIP -- Session 4: Security for Mobile Users -- ContikiSec: A Secure Network Layer for Wireless Sensor Networks under the Contiki Operating System -- A Mechanism for Identity Delegation at Authentication Level -- Introducing Sim-Based Security Tokens as Enabling Technology for Mobile Real-Time Services -- Towards True Random Number Generation in Mobile Environments -- Session 5: Embedded Systems and Mechanisms -- Towards Modelling Information Security with Key-Challenge Petri Nets -- Security and Trust for the Norwegian E-Voting Pilot Project E-valg 2011 -- Advanced SIM Capabilities Supporting Trust-Based Applications -- Towards Practical Enforcement Theories -- Session 6: Protocols and Protocol Analysis -- Security Analysis of AN.ON’s Payment Scheme -- Formal Analysis of the Estonian Mobile-ID Protocol -- Generating In-Line Monitors for Rabin Automata.This book constitutes the refereed proceedings of the 14th International Conference on Secure IT Systems, NordSec 2009, held in Oslo, Norway, October 14-16, 2009. The 20 revised full papers and 8 short papers presented were carefully reviewed and selected from 52 submissions. Under the theme Identity and Privacy in the Internet Age, this year's conference explored policies, strategies and technologies for protecting identities and the growing flow of personal information passing through the Internet and mobile networks under an increasingly serious threat picture. Among the contemporary security issues discussed were Security Services Modeling, Petri Nets, Attack Graphs, Electronic Voting Schemes, Anonymous Payment Schemes, Mobile ID-Protocols, SIM Cards, Network Embedded Systems, Trust, Wireless Sensor Networks, Privacy, Privacy Disclosure Regulations, Financial Cryptography, PIN Verification, Temporal Access Control, Random Number Generators, and some more.Security and Cryptology ;5838Application softwareInformation storage and retrievalCoding theoryInformation theoryComputer securityData structures (Computer science)Data encryption (Computer science)Computer Applicationshttps://scigraph.springernature.com/ontologies/product-market-codes/I23001Information Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Kongress.swdOslo (2009)swdApplication software.Information storage and retrieval.Coding theory.Information theory.Computer security.Data structures (Computer science).Data encryption (Computer science).Computer Applications.Information Storage and Retrieval.Coding and Information Theory.Systems and Data Security.Data Structures and Information Theory.Cryptology.005.8DAT 461fstubSS 4800rvkJøsang Audunedthttp://id.loc.gov/vocabulary/relators/edtMaseng Torleivedthttp://id.loc.gov/vocabulary/relators/edtKnapskog Svein Jedthttp://id.loc.gov/vocabulary/relators/edtNordic Conference on Secure IT SystemsBOOK996465313803316Identity and Privacy in the Internet Age773685UNISA01966nam 2200613 450 99646653600331620220405170714.03-540-35921-410.1007/BFb0068264(CKB)1000000000438164(SSID)ssj0000321464(PQKBManifestationID)12097326(PQKBTitleCode)TC0000321464(PQKBWorkID)10280930(PQKB)10622304(DE-He213)978-3-540-35921-0(MiAaPQ)EBC5590831(Au-PeEL)EBL5590831(OCoLC)1066189434(MiAaPQ)EBC6842947(Au-PeEL)EBL6842947(OCoLC)1159636973(PPN)155195484(EXLCZ)99100000000043816420220303d1978 uy 0engurnn#008mamaatxtccrThe Atiyah-Singer index theorem an introduction /Patrick Shanahan1st ed. 1978.Berlin ;Heidelberg :Springer-Verlag,[1978]©19781 online resource (VIII, 228 p.)Lecture Notes in Mathematics ;638Bibliographic Level Mode of Issuance: Monograph3-540-08660-9 Statement of the theorem -- Applications of the index theorem -- Outline of the proof -- The atiyah-singer fixed point theorem -- Applications of the fixed point theorem.Lecture notes in mathematics (Springer-Verlag) ;638.Index theoremsDifferential operatorsIndex theorems.Differential operators.514.7458G10mscShanahan Patrick1931-57103MiAaPQMiAaPQMiAaPQBOOK996466536003316The Atiyah-Singer index theorem2830894UNISA