00889nam--2200313---450 99000164929020331620200729073159.0000164929USA01000164929(ALEPH)000164929USA0100016492920040511d1955----km-y0itay0103----bafreFR||||||||001yy<<Les>> troubadours dans leurs vie et dans leurs OeuvresErnest HoepffnerPariaArmand Colin1955240 p.in 16°, 17 cm20012001001-------2001HOEPFFNER,Ernest195180ITsalbcISBD990001649290203316VI.1.B. 10(V Filol. Rom. C 87)16434 L.M.V Filol.BKUMATroubadours dans leurs vie et dans leurs Oeuvres942811UNISA05192nam 22008295 450 99646578570331620200701051253.03-540-45184-610.1007/b13863(CKB)1000000000212208(SSID)ssj0000321934(PQKBManifestationID)11262366(PQKBTitleCode)TC0000321934(PQKBWorkID)10281040(PQKB)10608473(DE-He213)978-3-540-45184-6(MiAaPQ)EBC3087902(PPN)155202383(EXLCZ)99100000000021220820121227d2003 u| 0engurnn#008mamaatxtccrCommunications and Multimedia Security. Advanced Techniques for Network and Data Protection[electronic resource] 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings /edited by Antonio Lioy, Daniele Mazzocchi1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (VIII, 268 p.)Lecture Notes in Computer Science,0302-9743 ;2828Bibliographic Level Mode of Issuance: Monograph3-540-20185-8 Includes bibliographical references at the end of each chapters and index.Cryptography -- Computation of Cryptographic Keys from Face Biometrics -- AUTHMAC_DH: A New Protocol for Authentication and Key Distribution -- Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection -- Network Security -- Securing the Border Gateway Protocol: A Status Update -- Towards an IPv6-Based Security Framework for Distributed Storage Resources -- Operational Characteristics of an Automated Intrusion Response System -- Mobile and Wireless Network Security -- A Secure Multimedia System in Emerging Wireless Home Networks -- Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents -- A Security Scheme for Mobile Agent Platforms in Large-Scale Systems -- Trust and Privacy -- Privacy and Trust in Distributed Networks -- Extending the SDSI / SPKI Model through Federation Webs -- Trust- : An XML Framework for Trust Negotiations -- Application Security -- How to Specify Security Services: A Practical Approach -- Application Level Smart Card Support through Networked Mobile Devices -- Flexibly-Configurable and Computation-Efficient Digital Cash with Polynomial-Thresholded Coinage -- Multimedia Security -- Selective Encryption of the JPEG2000 Bitstream -- Robust Spatial Data Hiding for Color Images -- Watermark Security via Secret Wavelet Packet Subband Structures -- A Robust Audio Watermarking Scheme Based on MPEG 1 Layer 3 Compression -- Loss-Tolerant Stream Authentication via Configurable Integration of One-Time Signatures and Hash-Graphs -- Confidential Transmission of Lossless Visual Data: Experimental Modelling and Optimization.Lecture Notes in Computer Science,0302-9743 ;2828Data encryption (Computer science)Computer communication systemsOperating systems (Computers)Multimedia information systemsComputers and civilizationManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Multimedia Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I18059Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer communication systems.Operating systems (Computers).Multimedia information systems.Computers and civilization.Management information systems.Computer science.Cryptology.Computer Communication Networks.Operating Systems.Multimedia Information Systems.Computers and Society.Management of Computing and Information Systems.005.8Lioy Antonioedthttp://id.loc.gov/vocabulary/relators/edtMazzocchi Danieleedthttp://id.loc.gov/vocabulary/relators/edtCMS 2003MiAaPQMiAaPQMiAaPQBOOK996465785703316Communications and Multimedia Security. Advanced Techniques for Network and Data Protection2262769UNISA01286nam a2200241 i 4500991000357639707536220606s2018 it 000 0 ita d9788813368630b14459188-39ule_instBibl. Dip.le Aggr. Scienze Giuridiche - Sez. Studi Giuridiciita342.04La sussidarietà orizzontale nel titolo V della Costituzione e la sussidarietà generativa :verso l'auto-organizzazione della società civile istituente /a cura di Remo RealdonMilano :Wolters Kluwer ;Padova :Cedam,c2018VII, 390 p. ;24 cm.Sul front.: Atti del Convegno "Sussidarietà orizzontale nel titolo V della Costituzione. L'autoamministrazione", 20 settembre 2017 - Facoltà di Giurisprudenza - Università degli Studi di VeronaSussidiarietàDiritto costituzionaleRealdon, Remo.b1445918806-06-2206-06-22991000357639707536LE027 342.04 REA01.0112027000375509le027pE42.00-l- 00000.i1603264006-06-22Sussidarietà orizzontale nel titolo V della Costituzione e la sussidarietà generativa2856596UNISALENTOle02706-06-22ma -itait 00