04634nam 22005295 450 99646578960331620210622120517.01-280-38809-997866135660103-642-14577-910.1007/978-3-642-14577-3(CKB)2550000000015613(SSID)ssj0000446466(PQKBManifestationID)11297675(PQKBTitleCode)TC0000446466(PQKBWorkID)10496223(PQKB)10127500(DE-He213)978-3-642-14577-3(MiAaPQ)EBC3065556(PPN)149072716(EXLCZ)99255000000001561320100716d2010 u| 0engurnn#008mamaatxtccrFinancial Cryptography and Data Security[electronic resource] 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers /edited by Radu Sion1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (XII, 432p. 77 illus.)Security and Cryptology ;6052Bibliographic Level Mode of Issuance: Monograph3-642-14576-0 Includes bibliographical references and index.Constructive Cryptography – A Primer -- Security Mechanisms with Selfish Players in Wireless Networks -- Users Do the Darndest Things: True Stories from the CyLab Usable Privacy and Security Laboratory -- Multichannel Protocols to Prevent Relay Attacks -- A Traceability Attack against e-Passports -- Secure Computation with Fixed-Point Numbers -- Implementing a High-Assurance Smart-Card OS -- Unlinkable Priced Oblivious Transfer with Rechargeable Wallets -- Multiple Denominations in E-cash with Compact Transaction Data -- What’s in a Name? -- Cryptographic Protocol Analysis of AN.ON -- A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys -- Practical Private Set Intersection Protocols with Linear Complexity -- Design and Implementation of a Key-Lifecycle Management System -- Measuring the Perpetrators and Funders of Typosquatting -- A Learning-Based Approach to Reactive Security -- Embedded SFE: Offloading Server and Network Using Hardware Tokens -- The Phish-Market Protocol: Securely Sharing Attack Data between Competitors -- Building Incentives into Tor -- Tree-Homomorphic Encryption and Scalable Hierarchical Secret-Ballot Elections -- Automatically Preparing Safe SQL Queries -- PKI Layer Cake: New Collision Attacks against the Global X.509 Infrastructure -- Three-Round Abuse-Free Optimistic Contract Signing with Everlasting Secrecy -- Designing for Audit: A Voting Machine with a Tiny TCB -- Attacking of SmartCard-Based Banking Applications with JavaScript-Based Rootkits -- Security Applications of Diodes with Unique Current-Voltage Characteristics -- Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication -- All You Can Eat or Breaking a Real-World Contactless Payment System -- Shoulder-Surfing Safe Login in a Partially Observable Attacker Model -- Using Sphinx to Improve Onion Routing Circuit Construction -- Secure Multiparty AES -- Modulo Reduction for Paillier Encryptions and Application to Secure Statistical Analysis -- On Robust Key Agreement Based on Public Key Authentication -- A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing -- Signatures of Reputation -- Intention-Disguised Algorithmic Trading -- When Information Improves Information Security -- BetterThanPin: Empowering Users to Fight Phishing (Poster) -- Certification Intermediaries and the Alternative (Poster) -- SeDiCi: An Authentication Service Taking Advantage of Zero-Knowledge Proofs -- Poster Abstract: Security in Commercial Applications of Vehicular Ad-Hoc Networks -- Domain Engineering for Automatic Analysis of Financial Applications of Cryptographic Protocols -- hPIN/hTAN: Low-Cost e-Banking Secure against Untrusted Computers.Security and Cryptology ;6052Data encryption (Computer science)Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Data encryption (Computer science).Cryptology.005.82Sion Raduedthttp://id.loc.gov/vocabulary/relators/edtBOOK996465789603316Financial Cryptography and Data Security772196UNISA01906nam 2200361Ia 450 99639310490331620200824132934.0(CKB)1000000000783349(EEBO)2240899113(OCoLC)ocm14867885e(OCoLC)14867885(EXLCZ)99100000000078334919861124d1650 uy |engurcn|---mumuaThe divine trinunity of the Father, Son, and Holy Spirit, or, The blessed doctrine of the three coessentiall subsistents in the eternall Godhead without any confusion or division of the distinct subsistences or multiplication of the most single and entire Godhead[electronic resource] acknowledged, beleeved, adored by Christians, in opposition to pagans, Jewes, Mahumetans, blasphemous and antichristian hereticks, who say they are Christians, but are not /declared and published for the edification and satisfaction of all such as worship the only true God, Father, Son, and Holy Spirit, all three as one and the self same God blessed for ever, by Francis Cheynell ..London Printed by T.R. and E.M. for Samuel Gellibrand ...16501 online resource (511 p.) Title from title page.Includes bibliographical references.eebo-0014TrinityTheology, DoctrinalTrinity.Theology, Doctrinal.Cheynell Francis1608-1665.1004100EAFEAFWaOLNBOOK996393104903316The divine trinunity of the Father, Son, and Holy Spirit, or, The blessed doctrine of the three coessentiall subsistents in the eternall Godhead without any confusion or division of the distinct subsistences or multiplication of the most single and entire Godhead2380977UNISA02984nam 2200673 450 991077748080332120200520144314.01-281-12817-197866111281731-60119-849-30-8144-0948-2(CKB)1000000000441329(EBL)1638697(SSID)ssj0000073055(PQKBManifestationID)11110080(PQKBTitleCode)TC0000073055(PQKBWorkID)10103847(PQKB)11019235(PQKBManifestationID)16032201(PQKB)23913541(Au-PeEL)EBL1638697(CaPaEBR)ebr10843708(CaONFJC)MIL112817(OCoLC)871224248(CaSebORM)9780814474754(MiAaPQ)EBC1638697(EXLCZ)99100000000044132920070402h20082008 uy| 0engurunu|||||txtccrSupply chain cost management the AIM & DRIVE process for achieving extraordinary results /Jimmy Anklesaria1st editionNew York :AMACOM, American Management Association,[2008]©20081 online resource (258 p.)Includes index.0-8144-1742-6 0-8144-7475-6 The AIM & DRIVE process of cost management -- Agreeing on the need to manage costs -- Identifying critical costs in the supply chain -- Measuring secondary and tertiary costs -- Defining the key cost drivers and developing strategic options -- Reducing, eliminating, or changing activities that cause costs -- Implementing an action plan -- Verifying the plan with cost monitors -- Eternally improving and leveraging the process.For most supply chains, cost reduction is imperative to long-term survival. Yet identifying the costs that can be eliminated-and then doing so effectively-can prove impossible without the right method. This book introduces the same process the author has used to save companies like IBM, Kodak, and DuPont billions of dollars, simply by harnessing the knowledge of suppliers. Using real-life case studies and examples, the book takes readers step-by-step through the process.Supply chain cost management :the AIM and DRIVE process for achieving extraordinary resultsIndustrial procurementCost effectivenessIndustrial procurementCost controlBusiness logisticsManagementIndustrial procurementCost effectiveness.Industrial procurementCost control.Business logisticsManagement.658.7/2Anklesaria Jimmy1565168MiAaPQMiAaPQMiAaPQBOOK9910777480803321Supply chain cost management3834588UNINA