00871nam0-2200277---450-99000978579040332120131107092100.0000978579FED01000978579(Aleph)000978579FED0100097857920131107d1954----km-y0itay50------baitaIT--------001yySpese e passavità deducibili nell'imposta di ricchezza mobileseconda edizione aggiornata e ampliataSalvatore Traina-PortanovaMilanoGiuffrè editore1954VIII, 509 p.25 cmTraina-Portanova,Salvatore280271ITUNINARICAUNIMARCBK990009785790403321DT IV-14789DECDECSpese e passavità deducibili nell'imposta di ricchezza mobile833112UNINA01120oam 2200385 450 991047985680332120210924080231.00-87353-904-4(CKB)4100000011773034(MiAaPQ)EBC6478900(EXLCZ)99410000001177303420210703d2014 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierPrinciples to actions ensuring mathematical success for allReston, VA :National Council of Teachers of Mathematics,[2014]©20141 online resource (151 pages)0-87353-774-2 MathematicsStudy and teachingUnited StatesEffective teachingElectronic books.MathematicsStudy and teachingEffective teaching.510.71073MiAaPQMiAaPQUtOrBLWBOOK9910479856803321Principles to actions2457337UNINA04976nam 22008175 450 99646527370331620200630165107.03-642-34416-X10.1007/978-3-642-34416-9(CKB)3280000000002215(SSID)ssj0000788977(PQKBManifestationID)11407333(PQKBTitleCode)TC0000788977(PQKBWorkID)10723530(PQKB)10387548(DE-He213)978-3-642-34416-9(MiAaPQ)EBC3070181(PPN)168326884(EXLCZ)99328000000000221520121026d2012 u| 0engurnn|008mamaatxtccrSecurity, Privacy, and Applied Cryptography Engineering[electronic resource] Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012, Proceedings /edited by Andrey Bogdanov, Somitra Sanadhya1st ed. 2012.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2012.1 online resource (XII, 173 p. 29 illus.) Security and Cryptology ;7644Bibliographic Level Mode of Issuance: Monograph3-642-34415-1 Includes bibliographical references and index.A Novel Circuit Design Methodology to Reduce Side Channel Leakage -- The Schedulability of AES as a Countermeasure against Side Channel Attacks -- Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers -- Performance and Security Evaluation of AES S-Box-Based Glitch PUFs on FPGAs -- Relaxing IND-CCA: Indistinguishability against Chosen Ciphertext Verification Attack -- Towards Formal Analysis of Key Control in Group Key Agreement Protocols -- Some Results on Related Key-IV Pairs of Grain -- A Differential Fault Attack on Grain-128a Using MACs -- Breaking Hitag 2 Revisited -- Reduction in Lossiness of RSA Trapdoor Permutation -- Adaptively Secure Efficient Lattice (H)IBE in Standard Model with Short Public Parameters.This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied Cryptography Engineering held in Chennai, India, in November 2012. The 11 papers presented were carefully reviewed and selected from 61 submissions.  The papers are organized in topical sections on symmetric-key algorithms and cryptanalysis, cryptographic implementations, side channel analysis and countermeasures, fault tolerance of cryptosystems,  physically unclonable functions, public-key schemes and cryptanalysis, analysis and design of security protocol, security of systems and applications, high-performance computing in cryptology and cryptography in ubiquitous devices.Security and Cryptology ;7644Computer communication systemsData encryption (Computer science)Management information systemsComputer scienceAlgorithmsComputer securityComputers and civilizationComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Conference papers and proceedings.fastComputer communication systems.Data encryption (Computer science).Management information systems.Computer science.Algorithms.Computer security.Computers and civilization.Computer Communication Networks.Cryptology.Management of Computing and Information Systems.Algorithm Analysis and Problem Complexity.Systems and Data Security.Computers and Society.005.8Bogdanov Andreyedthttp://id.loc.gov/vocabulary/relators/edtSanadhya Somitraedthttp://id.loc.gov/vocabulary/relators/edtInternational Conference on Security, Privacy and Applied Cryptography EngineeringBOOK996465273703316Security, privacy, and applied cryptography engineering2065794UNISA